darkreading
Versa Introduces Integrated Endpoint Data Loss Prevention in SASE Solution
3 months 3 weeks ago
Cleo MFT Zero-Day Exploits Are About to Escalate, Analysts Warn
3 months 3 weeks ago
Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other indicators of an ongoing ransomware campaign, as patching details remain foggy, and no CVE has been issued.
Becky Bracken, Senior Editor, Dark Reading
Generative AI Security Tools Go Open Source
3 months 3 weeks ago
Businesses deploying large language models and other GenAI systems have a growing collection of open source tools for testing AI security.
Robert Lemos, Contributing Writer
With 'TPUXtract,' Attackers Can Steal Orgs' AI Models
3 months 3 weeks ago
A new side-channel attack method is a computationally practical way to infer the structure of a convolutional neural network — meaning that cyberattackers or rival companies can plagiarize AI models and take their data for themselves.
Nate Nelson, Contributing Writer
Test Your Cyber Skills With the SANS Holiday Hack Challenge
3 months 3 weeks ago
Open to players of all skill levels, the "Snow-mageddon" cybersecurity competition takes place in the world of Santa, elves, and Christmas mayhem.
Jennifer Lawinski
OData Injection Risk in Low-Code/No-Code Environments
3 months 3 weeks ago
As the adoption of LCNC grows, so will the complexity of the threats organizations face.
Amichai Shulman
'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks
3 months 3 weeks ago
A sophisticated social engineering cybercrime campaign bent on financial gain was observed being run from Tencent servers in Singapore.
Tara Seals, Managing Editor, News, Dark Reading
Lloyd's of London Launches New Cyber Insurance Consortium
3 months 3 weeks ago
Under the program, HITRUST-certified organizations gain access to exclusive coverage and rates.
Jennifer Lawinski
336K Prometheus Instances Exposed to DoS, 'Repojacking'
3 months 3 weeks ago
Open source Prometheus servers and exporters are leaking plaintext passwords and tokens, along with API addresses of internal locations.
Nate Nelson, Contributing Writer
Chinese Cops Caught Using Android Spyware to Track Mobile Devices
3 months 3 weeks ago
Law enforcement across mainland China have been using EagleMsgSpy surveillance tool to collect mobile device data since at least 2017, new research shows.
Becky Bracken, Senior Editor, Dark Reading
IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack
3 months 3 weeks ago
Researchers at Black Hat Europe demonstrate how to hack Ruijie Reyee access points without Wi-Fi credentials or even physical access to the device.
Becky Bracken, Senior Editor, Dark Reading
Europol Cracks Down on Holiday DDoS Attacks
3 months 3 weeks ago
In Operation PowerOFF, global authorities aim to deter individuals from engaging in malicious cyber acts.
Kristina Beek, Associate Editor, Dark Reading
Efforts to Secure US Telcos Beset by Salt Typhoon Might Fall Flat
3 months 3 weeks ago
The rules necessary to secure US communications have already been in place for 30 years, argues Sen. Wyden, the FCC just hasn't enforced them. It's unclear if they will help.
Nate Nelson, Contributing Writer
Cultivating a Hacker Mindset in Cybersecurity Defense
3 months 4 weeks ago
Security isn't just about tools — it's about understanding how the enemy thinks and why they make certain choices.
Roei Sherman
Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug
3 months 4 weeks ago
The US State Department has offered a $10 million reward for Guan Tianfeng, who has been accused of developing and testing a critical SQL injection flaw with a CVSS score of 9.8 used in Sophos attacks.
Kristina Beek, Associate Editor, Dark Reading
Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack
3 months 4 weeks ago
Threat actors punch holes in the company's online ordering systems, tripping up doughnut deliveries across the US after a late November breach.
Becky Bracken, Senior Editor, Dark Reading
Symmetrical Cryptography Pioneer Targets the Post-Quantum Era
3 months 4 weeks ago
Researchers at Cavero have created a correlating numbers mechanism, adding a layer of privacy that even threat actors can't gain enough information to breach.
Kristina Beek, Associate Editor, Dark Reading
Researchers Crack Microsoft Azure MFA in an Hour
3 months 4 weeks ago
A critical flaw in the company's rate limit for failed sign-in attempts allowed unauthorized access to a user account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more.
Elizabeth Montalbano, Contributing Writer
Cybersecurity Lessons From 3 Public Breaches
3 months 4 weeks ago
High-profile security incidents provide examples of how common vulnerabilities can be exploited. If you pay attention, you can learn from others' mistakes.
Dmytro Tereshchenko
Checked
2 hours 2 minutes ago
Public RSS feed
darkreading feed