darkreading
K2 Secures Navy SeaPort Next Generation Contract
11 months ago
Grupo Bimbo Ventures Announces Investment in NanoLock Security
11 months ago
Microsoft Cracks Down on Malicious Copilot AI Use
11 months ago
According to the tech giant, it has observed a threat group seeking out vulnerable customer accounts using generative AI, then creating tools to abuse these services.
Kristina Beek, Associate Editor, Dark Reading
Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw
11 months ago
The security vulnerability tracked as CVE-2024-50603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.
Jai Vijayan, Contributing Writer
Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results
11 months ago
Threat actors are targeting people searching for pirated or cracked software with fake downloaders that include infostealing malware such as Lumma and Vidar.
Elizabeth Montalbano, Contributing Writer
Telefonica Breach Exposes Jira Tickets, Customer Data
11 months ago
The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.
Kristina Beek, Associate Editor, Dark Reading
The Shifting Landscape of Open Source Security
11 months ago
By focusing on vigilant security practices, responsible AI deployment, and alignment with global regulatory standards, the OSS community can make 2025 a transformative year for security.
Christopher Robinson
Threat Actors Exploit a Critical Ivanti RCE Bug, Again
11 months ago
New year, same story. Despite Ivanti's commitment to secure-by-design principles, threat actors — possibly the same ones as before — are exploiting its edge devices for the nth time.
Nate Nelson, Contributing Writer
China's UNC5337 Exploits a Critical Ivanti RCE Bug, Again
11 months ago
New year, same story. Despite Ivanti's commitment to secure-by-design principles, Chinese threat actors are exploiting its edge devices for the nth time.
Nate Nelson, Contributing Writer
Fake CrowdStrike 'Job Interviews' Become Latest Hacker Tactic
11 months ago
Cybercriminals are luring victims into downloading the XMRig cryptomining malware via convincing emails, inviting them to schedule fake interviews using a malicious link.
Kristina Beek, Associate Editor, Dark Reading
Russia Carves Out Commercial Surveillance Success Globally
11 months ago
Growing sales of the System for Operative Investigative Activities (SORM), a Russian wiretapping platform, in Central Asia and Latin American suggests increasing risks for Western businesses.
Robert Lemos, Contributing Writer
The Path Toward Championing Diversity in Cybersecurity Education
11 months ago
To build a truly inclusive and diverse cybersecurity workforce, we need a comprehensive approach beyond recruitment and retention.
Laurie Salvail
Chinese APT Group Is Ransacking Japan's Secrets
11 months 1 week ago
Since 2019, MirrorFace has been stealing information from myriad Japanese organizations to gain leverage over Japan in the event of hostilities between the two countries, experts said.
Becky Bracken, Senior Editor, Dark Reading
Banshee 2.0 Malware Steals Apple's Encryption to Hide on Macs
11 months 1 week ago
The most recent iteration of the open source infostealer skates by antivirus programs on Macs, using an encryption mechanism stolen from Apple's own antivirus product.
Nate Nelson, Contributing Writer
Hacking Group 'Silk Typhoon' Linked to US Treasury Breach
11 months 1 week ago
The attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department's Office of Foreign Assets Control.
Kristina Beek, Associate Editor, Dark Reading
New AI Challenges Will Test CISOs & Their Teams in 2025
11 months 1 week ago
CISOs need to recognize the new threats AI can present — while also embracing AI-powered solutions to stay ahead of those threats.
Josh Lemos
India Readies Overhauled National Data Privacy Rules
11 months 1 week ago
The country awaits implementation guidelines for a framework that gives Indians greater autonomy and security over their personal data — and recognizes a right to personal privacy.
Nate Nelson, Contributing Writer
Fed 'Cyber Trust' Label: Good Intentions That Fall Short
11 months 1 week ago
The voluntary program is intended to boost consumer confidence in vulnerable IoT devices, but experts want to see vendors held to a higher standard.
Kristina Beek, Associate Editor, Dark Reading
CrowdStrike Achieves FedRAMP Authorization for New Modules
11 months 1 week ago
Checked
8 hours 36 minutes ago
Public RSS feed
darkreading feed