darkreading
[Virtual Event] Anatomy of a Data Breach: What to Do if it Happens to You
4 weeks 1 day hence
Verizon DBIR: Enterprises Face a Dangerous Vulnerability Glut
7 hours 3 minutes ago
Verizon's "2026 Data Breach Investigations Report" ("DBIR") finds that exploits are now involved in 31% of initial access for breaches, while patching lags too far behind the bad guys.
Alexander Culafi
Windows Zero-Day Barrage Continues After Patch Tuesday
7 hours 51 minutes ago
YellowKey, GreenPlasma, and MiniPlasma add to the growing list of vulnerabilities a security researcher disclosed over the past six weeks.
Jai Vijayan
CISA Exposes Secrets, Credentials in 'Private' Repo
9 hours 8 minutes ago
The agency's GitHub repository, publicly available since November 2025, was ironically named "Private-CISA."
Rob Wright
Stealer Spoofs Google, Microsoft & Apple, Then Backdoors macOS
9 hours 9 minutes ago
The SHub Reaper stealer, which hides behind fake WeChat and Miro installers, marks a shift from ClickFix social engineering to Apple script-based execution.
Elizabeth Montalbano
Looking Back, Looking Forward: Digesting a Dynamic Bouillabaisse of Cyber Evolution
15 hours 30 minutes ago
Dark Reading editors reflect on two decades of dramatic change — from perimeter defense to assume-breach strategies — and warn that while AI, cloud, and COVID-19 have transformed the threat landscape, organizations are still failing at fundamental security hygiene that could stop sophisticated attacks in their tracks.
Dark Reading Editorial Team
Is 2026 the Year AI Bills of Materials Get Real?
1 day 7 hours ago
Understanding AI BOMs and where they fit into risk management for artificial intelligence.
Ericka Chickowski, Contributing Writer
Microsoft Exchange Zero-Day Under Attack, No Patch Available
1 day 7 hours ago
CVE-2026-42897 stems from a cross-site scripting (XSS) vulnerability and can allow an attacker to compromise Outlook Web Access (OWA) mailboxes.
Rob Wright
'Claw Chain' Vulnerabilities Threaten OpenClaw Deployments
1 day 7 hours ago
The now-patched vulnerabilities in the rapidly growing AI agent framework allow attackers to steal credentials, escalate privileges, and maintain persistence.
Jai Vijayan
Shai-Hulud Worm Clones Spread After Code Release
1 day 9 hours ago
The release of Shai-Hulud source code spells trouble for software developers as researchers worry the self-replicating worm could scale.
Alexander Culafi
Fuel Tank Breaches Expand Scope of Iran's Cyber Offensive
1 day 13 hours ago
Security experts have long warned that insecure automatic tank gauge (ATG) systems exposed on the Internet can be tampered with by threat actors.
Elizabeth Montalbano
The Boring Stuff Is Dangerous Now
1 day 15 hours ago
AI agents capable of discovering and exploiting obscure vulnerabilities are emerging alongside developers producing vast amounts of potentially flawed AI-generated code, forcing defenders to adapt accordingly.
Shlomie Liberow
Boulevard of Broken Dreams: 2 Decades of Cyber Fails
1 day 16 hours ago
From the MGM and Caesars fiasco and MOVEit's patch nightmare to epic business blunders and the jaded reality of living in a post-breach world, Dark Reading looks back at the mistakes, miscalculations, systemic failures, and cringeworthy moments that still have us shaking our heads.
Dark Reading Editorial Team
Can Laws Stop Deepfakes? South Korea Aims to Find Out
2 days 3 hours ago
South Korea's local elections next month will be a test bed for how effective regulations might be to stymie the flow of deepfakes.
Alexander Culafi
Congress Puts Heat on Instructure After Canvas Outage
4 days 8 hours ago
The House Committee on Homeland Security sent a letter about the Canvas cyberattack, the same day that the edtech company said it reached an "agreement" with the ShinyHunters cybercriminals.
Rob Wright
Cyber Pioneers Ponder Past as Prologue
4 days 16 hours ago
Robert "RSnake" Hansen, Katie Moussouris, Rich Mogull, Richard Stiennon, and Bruce Schneier reflect on how their favorite columns penned for Dark Reading over the past 20 years have stood the test of time.
Kelly Jackson Higgins, Becky Bracken
Taiwan Bullet Train Hack Highlights Cybersecurity Gaps in Rail Systems
5 days 3 hours ago
A Taiwanese student experimenting with software-defined radio technology shut down three bullet trains for nearly an hour, leading to an anti-terrorism response.
Robert Lemos
SecurityScorecard Snags Driftnet to Level Up Threat Intelligence
5 days 8 hours ago
The acquisition looks to boost visibility into third-party ecosystems, which are becoming a bigger concern as vectors for supply chain attacks.
Arielle Waldman
Maximum Severity Cisco SD-WAN Bug Exploited in the Wild
5 days 8 hours ago
This is the second time this year a threat actor has leveraged a CVSS 10.0 vulnerability in Cisco's network control system.
Nate Nelson
Checked
1 hour 58 minutes ago
Public RSS feed
darkreading feed