darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
5 days 15 hours hence
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
21 hours 44 minutes ago
The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives.
Jai Vijayan
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
22 hours 44 minutes ago
Chris Inglis was the head civilian in charge at the NSA when the Snowden leak exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential threats, media disclosures, and "enculturation."
Dark Reading Staff
Feuding Ransomware Groups Leak Each Other's Data
23 hours 9 minutes ago
When 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations.
Alexander Culafi
Vidar Rises to Top of Chaotic Infostealer Market
1 day ago
The malware has filled the gap created by last year's law enforcement takedowns of Lumma and Rhadamanthys.
Jai Vijayan
Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
1 day 4 hours ago
Attackers continue to scale a campaign to seed Open VSX with seemingly benign VS Code extensions that spread self-propagating malware.
Elizabeth Montalbano
UNC6692 Combines Social Engineering, Malware, Cloud Abuse
1 day 23 hours ago
A newly discovered threat actor is using Microsoft Teams, AWS S3 buckets, and custom "Snow" malware in a multipronged campaign.
Alexander Culafi
Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
2 days 3 hours ago
A researcher discovered five different exploit paths that stem from an architectural weakness in how Windows' Remote Procedure Call (RPC) mechanism handles connections to unavailable services.
Elizabeth Montalbano
20-Year-Old Malware Rewrites History of Cyber Sabotage
2 days 6 hours ago
Researchers have uncovered a malware framework dubbed "fast16" that predates Stuxnet by five years.
Jai Vijayan
Parsing Agentic Offensive Security's Existential Threat
2 days 6 hours ago
Some fear frontier LLMs like Claude Mythos and OpenAI's GPT-5.5 will lead to cybersecurity annihilation. Ari Herbert-Voss notes this could be an opportunity.
Tara Seals
Helping Romance Scam Victims Requires a Proactive, Empathic Approach
4 days 20 hours ago
People targeted by confidence schemes find getting help is a lonely road. Experts want law enforcement, financial, and government institutions to work together and protect them.
Bree Fowler
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
5 days 2 hours ago
Some 29 people were charged, including a Cambodian senator, and authorities seized more than 500 Web domains tied to fake investment sites.
Nate Nelson
Glasswing Secured the Code. The Rest of Your Stack Is Still on You
5 days 4 hours ago
Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don't need sophisticated AI models to take advantage.
Ron Peled
AI Phishing Is No. 1 With a Bullet for Cyberattackers
5 days 5 hours ago
In the past six months, companies have seen a significant influx of AI-powered phishing, as cyberattackers progress from small campaigns to 1-to-1 personalized attacks.
Robert Lemos
North Korea's Lazarus Targets macOS Users via ClickFix
5 days 6 hours ago
Lazarus continues leveraging ClickFix for initial access and data theft: in this case, against Mac-centric organizations and their high-value leaders.
Alexander Culafi
Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia
5 days 18 hours ago
The threat actor gave itself plenty of options to support command and control, tapping Microsoft Outlook, Slack, Discord, and file.io for online espionage.
Nate Nelson
Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets
5 days 18 hours ago
The Chinese state-sponsored cyber threat is known for moving fast and trying odd attack vectors; now it's branching out in tools, victimology, and TTPs.
Tara Seals
China-Backed Hackers Are Industrializing Botnets
5 days 22 hours ago
China's state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk, and deniable way.
Jai Vijayan
Bad Memories Still Haunt AI Agents
6 days 4 hours ago
Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandled memory files will continue to threaten AI systems.
Robert Lemos
Checked
7 hours 23 minutes ago
Public RSS feed
darkreading feed