darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
5 days 16 hours hence
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
20 hours 42 minutes ago
The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives.
Jai Vijayan
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
21 hours 41 minutes ago
Chris Inglis was the head civilian in charge at the NSA when the Snowden leak exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential threats, media disclosures, and "enculturation."
Dark Reading Staff
Feuding Ransomware Groups Leak Each Other's Data
22 hours 7 minutes ago
When 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations.
Alexander Culafi
Vidar Rises to Top of Chaotic Infostealer Market
23 hours 13 minutes ago
The malware has filled the gap created by last year's law enforcement takedowns of Lumma and Rhadamanthys.
Jai Vijayan
Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
1 day 3 hours ago
Attackers continue to scale a campaign to seed Open VSX with seemingly benign VS Code extensions that spread self-propagating malware.
Elizabeth Montalbano
UNC6692 Combines Social Engineering, Malware, Cloud Abuse
1 day 22 hours ago
A newly discovered threat actor is using Microsoft Teams, AWS S3 buckets, and custom "Snow" malware in a multipronged campaign.
Alexander Culafi
Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
2 days 2 hours ago
A researcher discovered five different exploit paths that stem from an architectural weakness in how Windows' Remote Procedure Call (RPC) mechanism handles connections to unavailable services.
Elizabeth Montalbano
20-Year-Old Malware Rewrites History of Cyber Sabotage
2 days 5 hours ago
Researchers have uncovered a malware framework dubbed "fast16" that predates Stuxnet by five years.
Jai Vijayan
Parsing Agentic Offensive Security's Existential Threat
2 days 5 hours ago
Some fear frontier LLMs like Claude Mythos and OpenAI's GPT-5.5 will lead to cybersecurity annihilation. Ari Herbert-Voss notes this could be an opportunity.
Tara Seals
Helping Romance Scam Victims Requires a Proactive, Empathic Approach
4 days 19 hours ago
People targeted by confidence schemes find getting help is a lonely road. Experts want law enforcement, financial, and government institutions to work together and protect them.
Bree Fowler
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
5 days 1 hour ago
Some 29 people were charged, including a Cambodian senator, and authorities seized more than 500 Web domains tied to fake investment sites.
Nate Nelson
Glasswing Secured the Code. The Rest of Your Stack Is Still on You
5 days 3 hours ago
Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don't need sophisticated AI models to take advantage.
Ron Peled
AI Phishing Is No. 1 With a Bullet for Cyberattackers
5 days 4 hours ago
In the past six months, companies have seen a significant influx of AI-powered phishing, as cyberattackers progress from small campaigns to 1-to-1 personalized attacks.
Robert Lemos
North Korea's Lazarus Targets macOS Users via ClickFix
5 days 5 hours ago
Lazarus continues leveraging ClickFix for initial access and data theft: in this case, against Mac-centric organizations and their high-value leaders.
Alexander Culafi
Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia
5 days 17 hours ago
The threat actor gave itself plenty of options to support command and control, tapping Microsoft Outlook, Slack, Discord, and file.io for online espionage.
Nate Nelson
Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets
5 days 17 hours ago
The Chinese state-sponsored cyber threat is known for moving fast and trying odd attack vectors; now it's branching out in tools, victimology, and TTPs.
Tara Seals
China-Backed Hackers Are Industrializing Botnets
5 days 21 hours ago
China's state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk, and deniable way.
Jai Vijayan
Bad Memories Still Haunt AI Agents
6 days 3 hours ago
Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandled memory files will continue to threaten AI systems.
Robert Lemos
Checked
6 hours 20 minutes ago
Public RSS feed
darkreading feed