darkreading
How Hackers Make Salesforce More Secure in the Agentic AI Era
4 months 1 week ago
Menlo Security Acquires Votiro
4 months 1 week ago
Onapsis Introduces Control Central for New Era of RISE With SAP
4 months 1 week ago
Anubis Threat Group Seeks Out Critical Industry Victims
4 months 1 week ago
The threat group has a variety of tactics in its toolbox, including double extortion and ransomware-as-a-service.
Kristina Beek, Associate Editor, Dark Reading
Water Utility Co. Still Paying the Breach Price a Year Later
4 months 1 week ago
The UK's Southern Water has been forced to shell out millions due to a Black Basta cyberattack, and it has come to light that the total could include a ransom payment.
Kristina Beek, Associate Editor, Dark Reading
'Silver Fox' APT Skirts Windows Blocklist in BYOVD Attack
4 months 1 week ago
There's an untapped universe of exploitable drivers in the wild today. By exploiting just one of them, attackers were able to defeat security tools and infect Asian citizens with Gh0stRAT.
Nate Nelson, Contributing Writer
Name That Toon: Ka-Ching!
4 months 1 week ago
Feeling creative? Have something to say about cybersecurity? Submit your caption and our panel of experts will reward the winner with a $25 gift card.
John Klossner
Machine Unlearning: The Lobotomization of LLMs
4 months 1 week ago
In the end, the question isn't whether large language models will ever forget — it's how we'll develop the tools and systems to do so effectively and ethically.
John Funge
Fortanix Tackles Quantum Computing Threats With New Algorithms
4 months 1 week ago
Fortanix is implementing post-quantum cryptographic algorithms in its security suite to protect against future attacks.
Agam Shah
Stealthy Linux 'Auto-color' Backdoor Paints US Institutions With Malware
4 months 1 week ago
Attackers are using a novel malware that takes on different file names each time it's deployed; it also boasts an anti-removal mechanism to target universities and government offices.
Elizabeth Montalbano, Contributing Writer
How to Rein in Identity Session Security Risk With CAEP
4 months 1 week ago
Addressing the complexities of session management in multi-IDP environments, the protocol offers a pathway to real-time security, proactive risk mitigation, and enhanced user trust.
Aldo Pietropaolo
AI Tricksters Spin Up Fake DeepSeek Sites to Steal Crypto
4 months 1 week ago
The fake websites trick users into downloading and running malware that searches for personal information, especially anything related to cryptocurrency.
Kristina Beek, Associate Editor, Dark Reading
Microsoft 365 Accounts Get Sprayed by Mega-Botnet
4 months 1 week ago
The threat actors are exploiting noninteractive sign-ins, an authentication feature that security teams don't typically monitor.
Kristina Beek, Associate Editor, Dark Reading
Max Severity RCE Vuln in All Versions of MITRE Caldera
4 months 1 week ago
In the wrong hands, the popular red-teaming tool can be made to access networks, escalate privileges, conduct reconnaissance, and disguise malicious activity as a simulated exercise.
Jai Vijayan, Contributing Writer
North Korea's Lazarus Pulls Off Biggest Crypto Heist in History
4 months 2 weeks ago
Cyberattackers believed to be affiliated with the state-sponsored threat group pulled off the largest crypto heist reported to date, stealing $1.5 billion from exchange Bybit. It was carried out by interfering with a routine transfer between wallets.
Elizabeth Montalbano, Contributing Writer
Unmanaged Devices: The Overlooked Threat CISOs Must Confront
4 months 2 weeks ago
No matter the strategy, companies must approach securing unmanaged devices with sensitivity and respect for employee privacy.
Jeff Shiner
Industrial System Cyberattacks Surge as OT Stays Vulnerable
4 months 2 weeks ago
Nearly a third of organizations have an operational system connected to the Internet with a known exploited vulnerability, as attacks by state and non-state actors increase.
Robert Lemos, Contributing Writer
Betting (and Losing) the Farm on Traditional Cybersecurity
4 months 2 weeks ago
Standard SecOps training is no longer enough to tackle modern cybersecurity challenges. People need to develop nontraditional skills.
Maxime Lamothe-Brassard
Zero-Day Bug Pops Up in Parallels Desktop for Mac
4 months 2 weeks ago
A patch bypass for a bug in the popular desktop emulator enables root-level privilege escalation and has no fix in sight.
Jai Vijayan, Contributing Writer
Checked
2 hours 23 minutes ago
Public RSS feed
darkreading feed