darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
6 days 15 hours hence
UNC6692 Combines Social Engineering, Malware, Cloud Abuse
22 hours 56 minutes ago
A newly discovered threat actor is using Microsoft Teams, AWS S3 buckets, and custom "Snow" malware in a multipronged campaign.
Alexander Culafi
Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
1 day 3 hours ago
A researcher discovered five different exploit paths that stem from an architectural weakness in how Windows' Remote Procedure Call (RPC) mechanism handles connections to unavailable services.
Elizabeth Montalbano
20-Year-Old Malware Rewrites History of Cyber Sabotage
1 day 5 hours ago
Researchers have uncovered a malware framework dubbed "fast16" that predates Stuxnet by five years.
Jai Vijayan
Parsing Agentic Offensive Security's Existential Threat
1 day 6 hours ago
Some fear frontier LLMs like Claude Mythos and Anthropic's GPT-5.5 will lead to cybersecurity annihilation. Ari Herbert-Voss notes this could be an opportunity.
Tara Seals
Helping Romance Scam Victims Requires a Proactive, Empathic Approach
3 days 20 hours ago
People targeted by confidence schemes find getting help is a lonely road. Experts want law enforcement, financial, and government institutions to work together and protect them.
Bree Fowler
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
4 days 2 hours ago
Some 29 people were charged, including a Cambodian senator, and authorities seized more than 500 Web domains tied to fake investment sites.
Nate Nelson
Glasswing Secured the Code. The Rest of Your Stack Is Still on You
4 days 4 hours ago
Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don't need sophisticated AI models to take advantage.
Ron Peled
AI Phishing Is No. 1 With a Bullet for Cyberattackers
4 days 5 hours ago
In the past six months, companies have seen a significant influx of AI-powered phishing, as cyberattackers progress from small campaigns to 1-to-1 personalized attacks.
Robert Lemos
North Korea's Lazarus Targets macOS Users via ClickFix
4 days 6 hours ago
Lazarus continues leveraging ClickFix for initial access and data theft: in this case, against Mac-centric organizations and their high-value leaders.
Alexander Culafi
Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia
4 days 18 hours ago
The threat actor gave itself plenty of options to support command and control, tapping Microsoft Outlook, Slack, Discord, and file.io for online espionage.
Nate Nelson
Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets
4 days 18 hours ago
The Chinese state-sponsored cyber threat is known for moving fast and trying odd attack vectors; now it's branching out in tools, victimology, and TTPs.
Tara Seals
China-Backed Hackers Are Industrializing Botnets
4 days 22 hours ago
China's state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk, and deniable way.
Jai Vijayan
Bad Memories Still Haunt AI Agents
5 days 4 hours ago
Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandled memory files will continue to threaten AI systems.
Robert Lemos
'Zealot' Shows What AI's Capable of in Staged Cloud Attack
5 days 9 hours ago
The proof of concept revealed AI-based attacks unfold too fast for human defenders to respond, and that AI evinced more autonomous behavior than expected.
Jai Vijayan
Africa Relinquishes Cyberattack Lead to Latin America — For Now
5 days 12 hours ago
The volume of cyberattacks targeting Africa declined in the past year, with weekly attacks down 22%, as attackers seemingly shifted their focus to other regions.
Robert Lemos
'The Gentlemen' Rapidly Rises to Ransomware Prominence
5 days 22 hours ago
Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up operations — and its sophistication.
Alexander Culafi
DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'
6 days 4 hours ago
A compromised developer's repository serves as a worm-like infection vector to spread remote access Trojans (RATs) and other malware.
Elizabeth Montalbano
Electricity Is a Growing Area of Cyber-Risk
6 days 4 hours ago
IT has long been concerned with ensuring systems receive the right amount of electricity. Cyberattackers are realizing they can manipulate voltage fluctuations for their purposes, too.
Arielle Waldman
Checked
9 hours 9 minutes ago
Public RSS feed
darkreading feed