darkreading
Coinbase Extorted, Offers $20M for Info on Its Hackers
2 days 21 hours ago
Coinbase is going Liam Neeson on its attackers, potentially setting a new precedent for incident response in the wake of crypto- and blockchain-targeting cyberattacks.
Nate Nelson, Contributing Writer
Australian Human Rights Commission Leaks Docs in Data Breach
2 days 21 hours ago
An internal error led to public disclosure of reams of sensitive data that could be co-opted for follow-on cyberattacks.
Kristina Beek, Associate Editor, Dark Reading
Dynamic DNS Emerges as Go-to Cyberattack Facilitator
2 days 22 hours ago
Scattered Spider and other phishers and hacking groups are using rentable subdomains from dynamic DNS providers to obfuscate their activity and impersonate well-known brands.
Rob Wright
Attacker Specialization Puts Threat Modeling on Defensive
2 days 22 hours ago
Specialization among threat groups poses challenges for defenders, who now must distinguish between different actors responsible for different facets of an attack.
Robert Lemos, Contributing Writer
How to Develop and Communicate Metrics for CSIRPs
3 days 3 hours ago
A well-documented cybersecurity incident response program (CSIRP) provides the transparency needed for informed decision-making, protecting the organization in a constantly changing threat environment.
Craig Porter
Turkish APT Exploits Chat App Zero-Day to Spy on Iraqi Kurds
3 days 11 hours ago
Even after their zero-day turned into an n-day, attackers known as Marbled Dust or Sea Turtle continued to spy on military targets that had failed to patch Output Messenger.
Nate Nelson, Contributing Writer
Big Steelmaker Halts Operations After Cyber Incident
3 days 20 hours ago
Nucor made it clear its investigation is still in the early stages and didn't specify the nature or scope of the breach, nor who the threat actor might be.
Kristina Beek, Associate Editor, Dark Reading
Valarian Unveils Data Management Platform Designed for Government Use
3 days 20 hours ago
The startup, which previously launched the Acra platform, aims to address data management issues by isolating and compartmentalizing access to reduce fallout from system compromises.
Arielle Waldman
International Crime Rings Defraud US Gov't Out of Billions
3 days 21 hours ago
Fraudsters worldwide apply for money from the US government using stolen and forged identities, making off with hundreds of billions of dollars annually.
Nate Nelson, Contributing Writer
Attackers Target Samsung MagicINFO Server Bug, Patch Now
3 days 22 hours ago
CVE-2025-4632, a patch bypass for a Samsung MagicInfo 9 Server vulnerability disclosed last year, has been exploited by threat actors in the wild.
Alexander Culafi, Senior News Writer, Dark Reading
Critical SAP NetWeaver Vuln Faces Barrage of Cyberattacks
4 days ago
As threat actors continue to hop on the train of exploiting CVE-2025-31324, researchers are recommending that SAP administrators patch as soon as possible so that they don't fall victim next.
Kristina Beek, Associate Editor, Dark Reading
RSAC 2025: AI Everywhere, Trust Nowhere
4 days 3 hours ago
We're at an inflection point. AI is changing the game, but the rules haven't caught up.
Amir Khayat
RealDefense Partner Program Surpasses $100M in Annual Revenue
4 days 4 hours ago
Critical Infrastructure Under Siege: OT Security Still Lags
4 days 4 hours ago
With critical infrastructure facing constant cyber threats from the Typhoons and other corners, federal agencies and others are warning security for the OT network, a core technology in many critical sectors, is not powered up enough.
Alexander Culafi, Senior News Writer, Dark Reading
Infosec Layoffs Aren't the Bargain That Boards May Think
4 days 20 hours ago
Salary savings come with hidden costs, including insider threats and depleted cybersecurity defenses, conveying advantages to skilled adversaries, experts argue.
Becky Bracken
AI Agents May Have a Memory Problem
4 days 20 hours ago
A new study by researchers at Princeton University and Sentient shows it's surprisingly easy to trigger malicious behavior from AI agents by implanting fake "memories" into the data they rely on for making decisions.
Jai Vijayan, Contributing Writer
Cyber-Risk Calculator Takes the Guesswork Out of Assessment
4 days 20 hours ago
Resilience's new tool aims to help organizations better understand their risk profiles and make more informed decisions about improving their security posture.
Arielle Waldman
Ivanti EPMM Zero-Day Flaws Exploited in Chained Attack
4 days 21 hours ago
The security software maker said the vulnerabilities in Endpoint Manager Mobile have been exploited in the wild against "a very limited number of customers" — for now — and stem from open source libraries.
Rob Wright
Marks & Spencer Confirms Customer Data Stolen in Cyberattack
5 days 3 hours ago
The British retailer said no account passwords were compromised in last month's cyberattack, but the company will require customers to reset passwords "for extra peace of mind."
Kristina Beek, Associate Editor, Dark Reading
Checked
10 hours 49 minutes ago
Public RSS feed
darkreading feed