darkreading
Secure Your Spot at RSAC 2026 Conference
1 month 3 weeks hence
Fortinet Confirms New Zero-Day Behind Malicious SSO Logins
4 hours 12 minutes ago
To stop the ongoing attacks, the cybersecurity vendor took the drastic step of temporarily disabling FortiCloud single sign-on (SSO) authentication for all devices.
Rob Wright
Consumers Reluctant to Shop at Stores That Don't Take Security Seriously
5 hours 1 minute ago
The retail sector must adapt as consumers become more cybersecurity-conscious. Increased attack transparency is a good place to start.
Arielle Waldman
China-Backed 'PeckBirdy' Takes Flight for Cross-Platform Attacks
9 hours 7 minutes ago
In two separate campaigns, attackers used the JScript C2 framework to target Chinese gambling websites and Asian government entities with new backdoors.
Elizabeth Montalbano, Contributing Writer
Surging Cyberattacks Boost Latin America to Riskiest Region
11 hours 26 minutes ago
The region is up against tactics like data-leak extortion, credential-stealing campaigns, edge-device exploitation, and attackers leveraging AI.
Robert Lemos, Contributing Writer
AI & the Death of Accuracy: What It Means for Zero-Trust
1 day 2 hours ago
AI "model collapse," where LLMs over time train on more and more AI-generated data and become degraded as a result, can introduce inaccuracies, promulgate malicious activity, and impact PII protections.
Alexander Culafi
Vibe-Coded 'Sicarii' Ransomware Can't Be Decrypted
1 day 3 hours ago
A new ransomware strain that entered the scene last year has poorly designed code and uses Hebrew language that might be a false flag.
Alexander Culafi
Critical Telnet Server Flaw Exposes Forgotten Attack Surface
1 day 4 hours ago
While telnet is considered obsolete, the network protocol is still used by hundreds of thousands of legacy systems and IoT devices for remote access.
Rob Wright
Microsoft Rushes Emergency Patch for Office Zero-Day
1 day 5 hours ago
To exploit the vulnerability, an attacker would need either system access or be able to convince a user to open a malicious Office file.
Jai Vijayan, Contributing Writer
'Stanley' Toolkit Turns Chrome Into Undetectable Phishing Vector
1 day 7 hours ago
The malware-as-a-service kit enables malicious extensions to overlay pages on real websites without changing the visible URL, signaling a fresh challenge for enterprise security.
Jai Vijayan, Contributing Writer
WorldLeaks Extortion Group Claims It Stole 1.4TB of Nike Data
1 day 8 hours ago
The sportswear brand is investigating an alleged breach of its network that exposed some 188,347 files of highly sensitive corporate data.
Elizabeth Montalbano, Contributing Writer
Hand CVE Over to the Private Sector
1 day 12 hours ago
How MITRE has mismanaged the world's vulnerability database for decades and wasted millions along the way.
Brian Martin
Beauty in Destruction: Exploring Malware's Impact Through Art
2 days 2 hours ago
Artistic initiatives turn cybersecurity into immersive exhibits at the Museum of Malware Art, transforming digital threats into thought-provoking experiences.
Andrada Fiscutean
Sandworm Blamed for Wiper Attack on Poland Power Grid
2 days 3 hours ago
Researchers attributed the failed attempt to the infamous Russian APT Sandworm, which is notorious for wiper attacks on critical infrastructure organizations.
Alexander Culafi
DPRK's Konni Targets Blockchain Developers With AI-Generated Backdoor
2 days 9 hours ago
The North Korean threat group is using a new PowerShell backdoor to compromise development environments and target cryptocurrency holdings, according to researchers.
Elizabeth Montalbano, Contributing Writer
2025 Was a Wake-up Call to Protect Human Decisions, Not Just Systems
5 days ago
Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures.
Rashmi Tallapragada
Swipe, Plug-in, Pwned: Researchers Find New Ways to Hack Vehicles
5 days 4 hours ago
Security researchers exploited dozens of vulnerabilities in vehicle infotainment systems and EV chargers during the latest Pwn2Own contest at Automotive World 2026.
Robert Lemos, Contributing Writer
Exploited Zero-Day Flaw in Cisco UC Could Affect Millions
5 days 4 hours ago
Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover.
Rob Wright
Europe's GCVE Raises Concerns Over Fragmentation in Vulnerability Databases
5 days 4 hours ago
GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders.
Arielle Waldman
Checked
2 hours 25 minutes ago
Public RSS feed
darkreading feed