darkreading
GITEX GLOBAL 2025
1 week 3 days hence
For One NFL Team, Tackling Cyber Threats Is Basic Defense
1 hour 17 minutes ago
The NFL's cyberattack surface is expanding at an unprecedented rate. To find out more, we spoke with a cyber defense coordinator from the Cleveland Browns.
Nate Nelson, Contributing Writer
Red Hat Investigates Widespread Breach of Private GitLab Repositories
2 hours 1 minute ago
A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."
Rob Wright
Phishing Is Moving From Email to Mobile. Is Your Security?
3 hours 48 minutes ago
With SMS, voice, and QR-code phishing incidents on the rise, it's time to take a closer look at securing the mobile user.
Jim Dolce
'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan
4 hours 48 minutes ago
The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.
Elizabeth Montalbano, Contributing Writer
Android Spyware in the UAE Masquerades as ... Spyware
8 hours 48 minutes ago
In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.
Nate Nelson, Contributing Writer
Google Sheds Light on ShinyHunters' Salesforce Tactics
20 hours 30 minutes ago
Mandiant provided proactive defenses against UNC6040's social engineering attacks that have led to several Salesforce breaches.
Rob Wright
Shutdown Threatens US Intel Sharing, Cyber Defense
21 hours 5 minutes ago
Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.
Jai Vijayan, Contributing Writer
A $50 'Battering RAM' Can Bust Confidential Computing
1 day 2 hours ago
Researchers have demonstrated an attack that can break through modern Intel and AMD processor technologies that protect encrypted data stored in memory.
Elizabeth Montalbano, Contributing Writer
Undead Operating Systems Haunt Enterprise Security Networks
1 day 3 hours ago
Windows 10 reaches end-of-life on Oct. 14, which will triple the number of vulnerable enterprise systems and create a massive attack surface for cybercriminals.
Fahmida Y. Rashid
China Imposes One-Hour Reporting Rule for Major Cyber Incidents
1 day 16 hours ago
The sweeping new regulations show that China's serious about hardening its own networks after launching widespread attacks on global networks.
Robert Lemos, Contributing Writer
New China APT Strikes With Precision and Persistence
1 day 20 hours ago
Phantom Taurus demonstrates a deep understanding of Windows environments, including advanced components like IIServerCore, a fileless backdoor that executes in memory to evade detection.
Jai Vijayan, Contributing Writer
'Klopatra' Trojan Makes Bank Transfers While You Sleep
1 day 21 hours ago
A sophisticated new banking malware is hard to detect, capable of stealing lots of money, and infecting thousands of people in Italy and Spain.
Nate Nelson, Contributing Writer
China Exploited New VMware Bug for Nearly a Year
1 day 22 hours ago
A seemingly benign privilege-escalation process in VMware and other software has likely benefited attackers and other malware strains for years, researchers noted.
Alexander Culafi
Can Shadow AI Risks Be Stopped?
2 days 3 hours ago
Agentic AI has introduced abundant shadow artificial intelligence (AI) risks. Cybersecurity startup Entro Security extends its platform to help enterprises combat the growing issue.
Arielle Waldman
'Trifecta' of Google Gemini Flaws Turn AI Into Attack Vehicle
2 days 7 hours ago
Flaws in individual models of Google's AI suite created significant security and privacy risks for users, demonstrating the need for heightened defenses.
Elizabeth Montalbano, Contributing Writer
AI-Powered Voice Cloning Raises Vishing Risks
2 days 10 hours ago
A researcher-developed framework could enable attackers to conduct real-time conversations using simulated audio to compromise organizations and extract sensitive information.
Kristina Beek
IoT Security Flounders Amid Churning Risk
2 days 20 hours ago
The Internet of Things (IoT) has made everything more interconnected, but an important US government security initiative is stuck in limbo while threat actors step up attacks on everything from medical gear to printers.
Arielle Waldman
Sneaky, Malicious MCP Server Exfiltrates Secrets via BCC
2 days 20 hours ago
The first known malicious MCP server is an AI integration tool that automatically sends email such as those related to password resets, account confirmations, security alerts, invoices, and receipts to threat actors.
Jai Vijayan, Contributing Writer
Checked
48 minutes 19 seconds ago
Public RSS feed
darkreading feed