darkreading
Secure Your Spot at RSAC 2026 Conference
5 days 21 hours hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
2 days 1 hour hence
China-Nexus Hackers Skulk in Southeast Asian Military Orgs for Years
12 hours 39 minutes ago
Researchers uncovered an extensive cyberespionage campaign that used novel backdoors and familiar evasion techniques to maintain persistent access to regional targets.
Rob Wright
GlassWorm Malware Evolves to Hide in Dependencies
17 hours 9 minutes ago
Researchers have identified dozens of malicious GlassWorm extensions that come with new evasion techniques.
Alexander Culafi
Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026
17 hours 11 minutes ago
Discover how Franz Regul, former CISO for the Paris 2024 Olympics, tackled unique cybersecurity challenges to protect the Olympics from evolving threats.
Kristina Beek
Attackers Abuse LiveChat to Phish Credit Card, Personal Data
23 hours 29 minutes ago
A social engineering campaign impersonating PayPal and Amazon uses customer support interactions to acquire sensitive info.
Elizabeth Montalbano
Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
3 days 18 hours ago
The excitement around Cisco's latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked potential hazards.
Nate Nelson
The Data Gap: Why Nonprofit Cyber Incidents Go Underreported
3 days 19 hours ago
Threat actors target nonprofits due to security gaps and highly coveted information, but a lack of sufficient data makes it difficult to grasp the entire picture.
Arielle Waldman
Cyberattackers Don't Care About Good Causes
3 days 20 hours ago
Sightline Security's founder and advisory board discuss how cybersecurity poses significant problems for nonprofits and suggest ways the industry can help.
Arielle Waldman
Will AI Save Consumers From Smartphone-Based Phishing Attacks?
3 days 21 hours ago
Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making it more critical than ever for users to protect themselves from potential threats, new research from Omdia shows.
Hollie Hennessy, Aaron West
Most Google Cloud Attacks Start With Bug Exploitation
4 days ago
Forget stolen credentials and misconfigurations. Thanks to AI, the new top cause of compromises in the cloud is vulnerability exploits that beat patching cycles.
Robert Lemos
Real-Time Banking Trojan Strikes Brazil's Pix Users
4 days ago
The latest banking Trojan campaign to hit Brazil combines classic malware with a real-time human operator, waiting for the perfect moment to strike.
Alexander Culafi
Why Post-Quantum Cryptography Can't Wait
4 days 15 hours ago
Organizations have to prepare to ensure they have cryptography in place in the post-quantum world.
Manju Naglapur
Iran MOIS Colludes With Criminals to Boost Cyberattacks
4 days 16 hours ago
Iranian APTs have long pretended to be cybercriminal groups. Now they're working with actual cybercriminal groups.
Nate Nelson
Commercial Spyware Opponents Fear US Policy Shifting
4 days 17 hours ago
Rescinded sanctions and reactivated contracts have created confusion about the Trump administration's spyware policy and where it draws the line.
Rob Wright
Delinea's StrongDM Acquisition Highlights the Changing Role of PAM
4 days 20 hours ago
StrongDM, which injects ephemeral, real-time credentials into developer workflows, will enable Delinea to offer privilege access management across cloud, SaaS, Kubernetes, and database environments.
Jeffrey Schwartz
Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
4 days 21 hours ago
The Iranian cyberattack on Stryker is the kind of stress test that business continuity and disaster recovery programs often do not plan for.
Jai Vijayan
What Orgs Can Learn From Olympics, World Cup IR Plans
4 days 23 hours ago
In this edition of "Reporters' Notebook," we discuss cyberattackers targeting the Milan-Cortina Winter Games, adding them to a long list of global sporting events in the crosshairs. Though the attack surface is grander, there are key incident-response takeaways for regular enterprises, too.
Tara Seals
A Guy Who Wrote the Code Died in 2005. I Still Have to Secure It
5 days 15 hours ago
The real front line of American cybersecurity is a bidding war on eBay for 30-year-old industrial controllers.
Chuck Everette
Checked
1 hour 39 minutes ago
Public RSS feed
darkreading feed