darkreading
The CISO-COO Partnership: Protecting Operational Excellence
6 hours 43 minutes ago
Digital transformation has made cybersecurity preparation part of operational resilience for most organizations. This calls for a new relationship between CISO and COO.
George V. Hulme, Contributing Writer
React2Shell Exploits Flood the Internet as Attacks Continue
7 hours 43 minutes ago
As exploitation activity against CVE-2025-55182 ramps up, researchers are finding some proof-of-concept exploits contain bypasses for web application firewall (WAF) rules.
Rob Wright
Vibe Coding: Innovation Demands Vigilance
7 hours 48 minutes ago
Unmanaged coding is indeed an alluring idea, but can introduce a host of significant cybersecurity dangers, Constantine warns.
Chrissa Constantine
Microsoft Will Bundle Security Copilot With M365 Enterprise Licenses
8 hours 22 minutes ago
The move aims to expand the use of Security Copilot and comes with the launch of 12 new agents from Microsoft at the company's Ignite conference last week.
Jeffrey Schwartz
Supply Chain Attacks Targeting GitHub Actions Increased in 2025
9 hours 17 minutes ago
At this week's Black Hat Europe conference, two researchers urged developers to adopt a shared responsibility model for open source software and not leave it all up to GitHub to handle.
Jeffrey Schwartz
Are Trade Concerns Trumping US Cybersecurity?
13 hours 55 minutes ago
The Trump administration appears to have dropped sanctions against Chinese actors for the Salt Typhoon attacks on US telecoms; but focusing on diplomacy alone misses the full picture, experts say.
Robert Lemos, Contributing Writer
Hamas-Linked Hackers Probe Middle Eastern Diplomats
20 hours 55 minutes ago
Hamas's best hackers have been maturing, building better malware, and spreading their attacks more widely across the region.
Nate Nelson, Contributing Writer
Money Mules Require Banks to Switch from Defense to Offense
1 day 4 hours ago
Financial institutions need to be proactive when identifying and mentally preventing fraudulent activity. Here's what to watch for.
Jonathan Frost
Encouraging Industry Voices to Write for the Commentary Section
1 day 5 hours ago
Dark Reading will continue to publish Tech Talks and Ask the Expert pieces in the Commentary section. Read on for submission guidelines.
Fahmida Y. Rashid
Attackers Exploited Gogs Zero-Day Flaw for Months
1 day 7 hours ago
Wiz disclosed a still-unpatched vulnerability in self-hosted Git service Gogs, which is a bypass for a previous RCE bug disclosed last year.
Alexander Culafi
AI in OT Sparks Cascade of Complex Challenges
1 day 13 hours ago
Using artificial intelligence in operational technology environments could be a bumpy ride full of trust issues and security challenges.
Arielle Waldman
Copilot's No-Code AI Agents Liable to Leak Company Data
1 day 17 hours ago
Microsoft puts the power of AI in the hands of everyday non-technical Joes. It's a nice idea, and a surefire recipe for security issues.
Nate Nelson, Contributing Writer
Storm-0249 Abuses EDR Processes in Stealthy Attacks
2 days 5 hours ago
The initial access broker has been weaponizing endpoint detection and response (EDR) platforms and Windows utilities in recent high-precision attacks.
Jai Vijayan, Contributing Writer
ClickFix Style Attack Uses Grok, ChatGPT for Malware Delivery
2 days 6 hours ago
A new twist on the social engineering tactic is making waves, combining SEO poisoning and legitimate AI domains to install malware on victims' computers.
Alexander Culafi
Feds: Pro-Russia Hacktivists Target US Critical Infrastructure
2 days 14 hours ago
So far the attacks, which compromise virtual network computing (VNC) connections in OT systems, have not been particularly destructive, but this could change as they evolve.
Elizabeth Montalbano, Contributing Writer
Japanese Firms Suffer Long Tail of Ransomware Damage
3 days 3 hours ago
Ransomware actors have targeted manufacturers, retailers, and the Japanese government, with many organizations requiring months to recover.
Robert Lemos, Contributing Writer
Microsoft Fixes Exploited Zero Day in Light Patch Tuesday
3 days 5 hours ago
Proof-of-concept exploit code is publicly available for two other flaws in this month's Patch Tuesday. In total, the company issued patches for more than 1,150 flaws this year.
Jai Vijayan, Contributing Writer
Packer-as-a-Service Shanya Hides Ransomware, Kills EDR
3 days 7 hours ago
Shanya is the latest in an emerging field of packing malware, selling obfuscation functionality in order to help ransomware actors reach their target.
Alexander Culafi
Analysts Warn of Cybersecurity Risks in Humanoid Robots
3 days 11 hours ago
Think "Blade Runner," but the robots can be hacked more easily than your home computer.
Nate Nelson, Contributing Writer
Checked
54 minutes 9 seconds ago
Public RSS feed
darkreading feed