darkreading
Secure Your Spot at RSAC 2026 Conference
1 month 2 weeks hence
Google Looker Bugs Allow Cross-Tenant RCE, Data Exfil
14 hours 16 minutes ago
Attackers could even have used one vulnerable Lookout user to gain access to other GCP tenants' environments.
Nate Nelson, Contributing Writer
Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days
1 day 3 hours ago
APT28's attacks rely on specially crafted Microsoft Rich Text Format (RTF) documents to kick off a multistage infection chain to deliver malicious payloads.
Jai Vijayan, Contributing Writer
GlassWorm Malware Returns to Shatter Developer Ecosystems
1 day 4 hours ago
The self-replicating malware has poisoned a fresh set of Open VSX software components, leaving potential downstream victims with infostealer infections.
Alexander Culafi
8-Minute Access: AI Accelerates Breach of AWS Environment
1 day 8 hours ago
The AI-assisted attack, which started with exposed credentials from public S3 buckets, rapidly achieved administrative privilges.
Elizabeth Montalbano, Contributing Writer
Dark Patterns Undermine Security, One Click at a Time
1 day 8 hours ago
People trust organizations to do the right thing, but some websites and apps have user interfaces that ultimately lead to inadequate security for users.
Arielle Waldman
Attackers Harvest Dropbox Logins Via Fake PDF Lures
2 days 2 hours ago
A malware-free phishing campaign targets corporate inboxes and asks employees to view "request orders," ultimately leading to Dropbox credential theft.
Alexander Culafi
County Pays $600K to Wrongfully Jailed Pen Testers
2 days 3 hours ago
Iowa police arrested two penetration testers in 2019 for doing their jobs, highlighting the risk to security professionals in red teaming exercises.
Nate Nelson, Contributing Writer
Chinese Hackers Hijack Notepad++ Updates for 6 Months
2 days 5 hours ago
State-sponsored threat actors compromised the popular code editor's hosting provider to redirect targeted users to malicious downloads.
Jai Vijayan, Contributing Writer
ShinyHunters Expands Scope of SaaS Extortion Attacks
2 days 9 hours ago
Following their attacks on Salesforce instances last year, members of the cybercrime group have broadened their targeting and gotten more aggressive with extortion tactics.
Elizabeth Montalbano, Contributing Writer
Torq Moves SOCs Beyond SOAR With AI-Powered Hyper Automation
5 days 3 hours ago
Investors poured $140 million into Torq's Series D Round, raising the startup's valuation to $1.2 billion, to bring AI-based "hyper automation" to SOCs.
Jeffrey Schwartz
2026: The Year Agentic AI Becomes the Attack-Surface Poster Child
5 days 4 hours ago
Dark Reading asked readers whether agentic AI attacks, advanced deepfake threats, board recognition of cyber as a top priority, or password-less technology adoption would be most likely to become a trending reality for 2026.
Tara Seals
Out-of-the-Box Expectations for 2026 Reveal a Grab Bag of Risk
5 days 4 hours ago
Security teams need to be thinking about this list of emerging cybersecurity realities to avoid rolling the dice on enterprise security risks (and opportunities).
Tara Seals
Tenable Tackles AI Governance, Shadow AI Risks, Data Exposure
5 days 4 hours ago
The Tenable One AI Exposure add-on discovers unsanctioned AI use in the organization and enforces policy compliance with approved tools.
Jeffrey Schwartz
OpenClaw AI Runs Wild in Business Environments
5 days 8 hours ago
The popular open source AI assistant (aka ClawdBot, MoltBot) has taken off, raising security concerns over its privileged, autonomous control within users' computers.
Robert Lemos, Contributing Writer
Chinese APTs Hacking Asian Orgs With High-End Malware
5 days 23 hours ago
Advanced persistent threat (APT) groups have deployed new cyber weapons against a variety of targets, highlighting the increasing threats to the region.
Nate Nelson, Contributing Writer
Trump Administration Rescinds Biden-Era Software Guidance
6 days 2 hours ago
Federal agencies will no longer be required to solicit software attestations that they comply with NIST's Secure Software Development Framework (SSDF). What that means long term is unclear.
Alexander Culafi
Second Round of Critical RCE Bugs in n8n Spikes Corporate Risk
6 days 3 hours ago
A new around of vulnerabilities in the popular AI automation platform could let attackers hijack servers and steal credentials, allowing full takeover.
Jai Vijayan, Contributing Writer
'Semantic Chaining' Jailbreak Dupes Gemini Nano Banana, Grok 4
6 days 9 hours ago
If an attacker splits a malicious prompt into discrete chunks, some large language models (LLMs) will get lost in the details and miss the true intent.
Nate Nelson, Contributing Writer
Checked
13 hours 16 minutes ago
Public RSS feed
darkreading feed