darkreading
Secure Your Spot at RSAC 2026 Conference
1 month hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
3 weeks 4 days hence
Attackers Use New Tool to Scan for React2Shell Exposure
23 hours 34 minutes ago
Researchers say threat actors wielded the sophisticated — and unfortunately named — toolkit to target high-value networks for React2Shell exploitation.
Nate Nelson
'God-Like' Attack Machines: AI Agents Ignore Security Policies
1 day 2 hours ago
Microsoft Copilot recently summarized and leaked user emails; but any AI agent will go above and beyond to complete assigned tasks, even breaking through their carefully designed guardrails.
Robert Lemos
Lessons From AI Hacking: Every Model, Every Layer Is Risky
1 day 2 hours ago
After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities.
Robert Lemos
Latin America's Cyber Maturity Lags Threat Landscape
1 day 6 hours ago
The slower pace of upgrades has the unintended impact of creating a haven for attackers, especially for initial access brokers and ransomware gangs.
Alexander Culafi
Emerging Chiplet Designs Spark Fresh Cybersecurity Challenges
1 day 21 hours ago
As scaled-down circuits with limited functions redefine computing for AI systems and autonomous vehicles, their flexibility demands new approaches to safeguard critical infrastructure.
Agam Shah
Supply Chain Attack Secretly Installs OpenClaw for Cline Users
1 day 22 hours ago
The malicious version of Cline's npm package — 2.3.0 — was downloaded more than 4,000 times before it was removed.
Rob Wright
Best-in-Class 'Starkiller' Phishing Kit Bypasses MFA
1 day 22 hours ago
A user-friendly PhaaS tool beats standard methods for detecting phishing attacks by live-proxying legitimate login sites.
Nate Nelson
Abu Dhabi Finance Week Exposed VIP Passport Details
1 day 23 hours ago
Unprotected cloud data sends the wrong signal at a time when the emirate's trying to attract investors and establish itself as a global financial center.
Jai Vijayan
Connected and Compromised: When IoT Devices Turn Into Threats
2 days 5 hours ago
Reused passwords, a lack of network segmentation, and poor sanitization processes make the Internet of Things' attack surfaces more dangerous.
Arielle Waldman
More Than 40% of South Africans Were Scammed in 2025
2 days 13 hours ago
Survey underscores the reality that scammers follow "scalable opportunities and low friction," rather than rich targets that tend to be better protected.
Nate Nelson
Scam Abuses Gemini Chatbots to Convince People to Buy Fake Crypto
2 days 22 hours ago
A convincing presale site for phony "Google Coin" features an AI assistant that engages victims with a slick sales pitch, funneling payment to attackers.
Elizabeth Montalbano, Contributing Writer
Critical Grandstream VoIP Bug Highlights SMB Security Blind Spot
2 days 23 hours ago
CVE-2026-2329 allows unauthenticated root-level access to SMB phone infrastructure, so attackers can intercept calls, commit toll fraud, and impersonate users.
Jai Vijayan
Threat Intelligence Has a Human-Shaped Blind Spot
2 days 23 hours ago
How I realized what I was taught to about threat intelligence was missing something crucial.
Dr. Megan Squire
Dell's Hard-Coded Flaw: A Nation-State Goldmine
2 days 23 hours ago
A China-related attacker has exploited the vendor flaw since mid-2024, allowing it to move laterally, maintain persistent access, and deploy malware.
Alexander Culafi
A CISO's Playbook for Defending Data Assets Against AI Scraping
3 days 1 hour ago
Discover a strategic approach to govern scraping risks, balance security with business growth, and safeguard intellectual capital from automated data harvesting.
Areejit Banerjee
Singapore & Its 4 Major Telcos Fend Off Chinese Hackers
3 days 19 hours ago
After detecting a zero-day attack, the country's effective response was attributed to the tight relationship between its government and private industry.
Robert Lemos
Supply Chain Attack Embeds Malware in Android Devices
3 days 22 hours ago
Keenadu downloads payloads that hijack browser searches, commit ad fraud, and execute other actions without user knowledge.
Jai Vijayan
Checked
40 minutes 4 seconds ago
Public RSS feed
darkreading feed