darkreading
Silk Typhoon Attacks North American Orgs in the Cloud
22 hours 57 minutes ago
A Chinese APT is going where most APTs don't: deep into the cloud, compromising supply chains and deploying uncommon malware.
Nate Nelson, Contributing Writer
ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination
23 hours 28 minutes ago
A bug in the control board that connects peripheral devices in commonly used Dell laptops allowed malicious access all the way down to the firmware running on the device chip, new research finds.
Becky Bracken
Apple Intelligence Is Picking Up More User Data Than Expected, Researcher Finds
1 day ago
Music tastes, location information, even encrypted messages — Apple's servers are gathering a "surprising" amount of personal data through Apple Intelligence, Lumia Security's Yoav Magid warns in his new analysis.
Becky Bracken
Interpol Arrests Over 1K Cybercriminals in 'Operation Serengeti 2.0'
1 day 2 hours ago
The operation disrupted countless scams, and authorities seized a significant amount of evidence and recovered nearly $100 million in lost funds.
Kristina Beek
Apple Patches Zero-Day Flaw Used in 'Sophisticated' Attack
1 day 5 hours ago
CVE-2025-43300 is the latest zero-day bug used in cyberattacks against "targeted individuals," which could signify spyware or nation-state hacking.
Rob Wright
The Growing Challenge of AI Agent and NHI Management
1 day 5 hours ago
The growing ecosystem of agents, chatbots, and machine credentials that outnumber human users by an order of magnitude is creating a poorly understood but potentially major security issue.
Michael Morgenstern
Insurers May Limit Payments in Cases of Unpatched CVEs
1 day 6 hours ago
Some insurers look to limit payouts to companies that don't remediate serious vulnerabilities in a timely manner. Unsurprisingly, most companies don't like those restrictions.
Robert Lemos, Contributing Writer
Do Claude Code Security Reviews Pass the Vibe Check?
1 day 6 hours ago
AI-assisted security reviews from Anthropic and others could help level up enterprise application security in the era of vibe coding.
Ericka Chickowski, Contributing Writer
Personal Liability, Security Becomes Bigger Issues for CISOs
1 day 7 hours ago
While the furor from CISO prosecutions has died down, worries continue over a lack of liability protections and potential targeting by cybercriminals and hackers for their privileged roles.
Robert Lemos, Contributing Writer
System Shocks? EV Smart Charging Tech Poses Cyber-Risks
1 day 22 hours ago
Trend Micro's Salvatore Gariuolo talks with the Black Hat USA 2025 News Desk about how the new ISO 15118 standard for electric vehicle smart charging and vehicle-to-grid communications can be weaponized by threat actors.
Rob Wright
Scattered Spider Member Sentenced to a Decade in Prison
1 day 22 hours ago
Noah Michael Urban, 20, was one of several members of the Scattered Spider collective who were arrested and charged in 2024 in connection with high-profile cyberattacks.
Kristina Beek
Easy ChatGPT Downgrade Attack Undermines GPT-5 Security
1 day 23 hours ago
By using brief, plain clues in their prompts that are likely to influence the app to query older models, a user can downgrade ChatGPT for malicious ends.
Nate Nelson, Contributing Writer
Why Video Game Anti-Cheat Systems Are a Cybersecurity Goldmine
1 day 23 hours ago
Sam Collins and Marius Muench of the University of Birmingham, UK, join the Black Hat USA 2025 News Desk to explain how anti-cheat systems in video games provide valuable lessons on defending against threat actors' techniques and strategies.
Rob Wright
How Architectural Controls Help Can Fill the AI Security Gap
2 days 1 hour ago
NCC Group's David Brauchler III shares how foundational controls and threat modeling strategies can help secure agentic AI tools in ways traditional guardrails can't.
Alexander Culafi
Hackers Abuse VPS Infrastructure for Stealth, Speed
2 days 2 hours ago
New research highlights how threat actors abuse legitimate virtual private server offerings in order to spin up infrastructure cheaply, quietly, and fast.
Alexander Culafi
K-12 School Incident Response Plans Fall Short
2 days 2 hours ago
Quick recovery relies on three security measures.
Arielle Waldman
Tree of AST: A Bug-Hunting Framework Powered by LLMs
2 days 3 hours ago
Teenaged security researchers Sasha Zyuzin and Ruikai Peng discuss how their new vulnerability discovery framework leverages LLMs to address limitations of the past.
Alexander Culafi
Prepping the Front Line for MFA Social Engineering Attacks
2 days 5 hours ago
Attackers will continue to evolve, and the help desk will always be a target. But with the right mix of training, support, and trust, frontline agents can become your biggest security assets.
Paul Underwood
Tailing Hackers, Columbia University Uses Logging to Improve Security
2 days 6 hours ago
Logging netflows provided valuable insight about attacker tactics during a breach by state-sponsored hackers targeting Columbia's research labs.
Mercedes Cardona
Checked
5 hours 49 minutes ago
Public RSS feed
darkreading feed