darkreading
RealDefense Opens $10M Fund to Help OEMs Monetize Installs With SmartScan Cybersecurity SDK
2 days 18 hours ago
New Crypto24 Ransomware Attacks Bypass EDR
2 days 18 hours ago
While several cybercrime groups have embraced "EDR killers," researchers say the deep knowledge and technical skills demonstrated by Crypto24 signify a dangerous escalation.
Rob Wright
Colt Telecommunications Struggles in Wake of Cyber Incident
2 days 19 hours ago
The UK telco said it temporarily took some systems offline as a "protective" measure in its investigation.
Kristina Beek
Using Security Expertise to Bridge the Communication Gap
3 days ago
Cybersecurity-focused leadership delivers better products and business outcomes.
Mike Riemer
Water Systems Under Attack: Norway, Poland Blame Russia Actors
3 days ago
Water and wastewater systems have become a favored target of nation-state actors, drawing increasing scrutiny following attacks on systems in multiple countries.
Robert Lemos, Contributing Writer
Downgrade Attack Allows Phishing Kits to Bypass FIDO
3 days 16 hours ago
You probably can't break FIDO authentication. Still, researchers have shown that there are ways to get around it.
Nate Nelson, Contributing Writer
State and Local Leaders Lobby Congress for Cybersecurity Resources
3 days 16 hours ago
Federal funding cuts to the Multi-State Information Sharing and Analysis Center (MS-ISAC) are about to leave more than 18,000 state and local organizations without access to basic cybersecurity resources they need to protect US national security, a letter sent to Congressional appropriators warns.
Becky Bracken
Agentic AI Use Cases for Security Soar, but Risks Demand Close Attention
3 days 17 hours ago
Organizations increasingly use agents to automate mundane tasks and address an overwhelming amount of sensitive data. However, adoption requires strict security strategies that keep humans in the loop for now.
Arielle Waldman
Google Chrome Enterprise: Advanced Browser Security for the Modern Workforce
3 days 17 hours ago
In this Dark Reading News Desk interview, Google's Mark Berschadski highlights the critical role browsers play in today's work environment and how Chrome Enterprise is evolving to meet modern security challenges while enabling productivity.
Terry Sweeney
Police & Government Email Access for Sale on Dark Web
3 days 17 hours ago
Cybercriminals are auctioning off live email credentials, giving other criminals access to sensitive systems, confidential intelligence, and, potentially, a higher success rate than ever.
Kristina Beek
NIST Digital Identity Guidelines Evolve With Threat Landscape
3 days 17 hours ago
The US National Institute of Standards and Technology updated its Digital Identity Guidelines to match current threats. The document detailed technical recommendations as well as suggestions for organizations.
Arielle Waldman
CISA Warns N-able Bugs Under Attack, Patch Now
3 days 18 hours ago
Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn't be seen at the beginning of an exploit chain.
Alexander Culafi
Cybersecurity Spending Slows & Security Teams Shrink
3 days 19 hours ago
Security budgets are lowest in healthcare, professional and business services, retail, and hospitality, but budget growth remained above 5% in financial services, insurance, and tech.
Kristina Beek
Google Chrome Enterprise: Extend Protections From Browser to OS
3 days 20 hours ago
Dark Reading's Terry Sweeney and Google's Loren Hudziak discuss how the humble web browser has transformed from a simple web access tool into a common conduit through which a lot of business is done.
Terry Sweeney
Navigating the Cybersecurity Budget Tug-of-War
3 days 23 hours ago
Companies ready to move beyond reactive defense and toward full-spectrum protection need to invest in strategies that rally around resiliency, unified cybersecurity, and data protection.
Scott Cooper
North Korea Attacks South Koreans With Ransomware
4 days 13 hours ago
DPRK hackers are throwing every kind of malware at the wall and seeing what sticks, deploying stealers, backdoors, and ransomware all at once.
Nate Nelson, Contributing Writer
Fortinet Products Are in the Crosshairs Again
4 days 16 hours ago
The company disclosed a critical FortiSIEM flaw with a PoC exploit for it the same week researchers warned of an ominous surge in malicious traffic targeting the vendor's SSL VPNs.
Jai Vijayan, Contributing Writer
Whispers of XZ Utils Backdoor Live on in Old Docker Images
4 days 17 hours ago
Developers maintaining the images made the "intentional choice" to leave the artifacts available as "a historical curiosity," given the improbability they'd be exploited.
Alexander Culafi
Popular AI Systems Still a Work-in-Progress for Security
4 days 18 hours ago
According to a recent Forescout analysis, open source models were significantly less successful in vulnerability research than commercial and underground models.
Robert Lemos, Contributing Writer
Checked
5 hours 48 minutes ago
Public RSS feed
darkreading feed