darkreading
Secure Your Spot at RSAC 2026 Conference
3 weeks 5 days hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
3 weeks 1 day hence
Lazarus Group Picks a New Poison: Medusa Ransomware
9 hours 5 minutes ago
The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.
Rob Wright
As Cybersecurity Firms Chase AI, VC Market Skyrockets
17 hours 19 minutes ago
Investments in cybersecurity startups took off in 2025 as venture capital firms focused not just on AI-native tech but on talent as well.
Robert Lemos
Spitting Cash: ATM Jackpotting Attacks Surged in 2025
1 day 8 hours ago
The attacks cost banks more than $20 million in losses last year, as criminals used many of the same tools and tactics they have wielded for more than a decade.
Jai Vijayan
More Than Dashboards: AI Decisions Must Be Provable
1 day 8 hours ago
AI systems have to be able to show a record of what happened and how.
James Urquhart
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount
1 day 9 hours ago
The long-active Iranian threat group debuted various attack strains and payloads in attacks against organizations in the Middle East and Africa.
Elizabeth Montalbano
Enigma Cipher Device Still Holds Secrets for Cyber Pros
1 day 10 hours ago
The Nazi relic's history is riddled with resilience errors, and those lessons still apply to defending against modern cyber threats.
Becky Bracken
600+ FortiGate Devices Hacked by AI-Armed Amateur
1 day 10 hours ago
A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.
Alexander Culafi
Attackers Use New Tool to Scan for React2Shell Exposure
4 days 9 hours ago
Researchers say threat actors wielded the sophisticated — and unfortunately named — toolkit to target high-value networks for React2Shell exploitation.
Nate Nelson
'God-Like' Attack Machines: AI Agents Ignore Security Policies
4 days 11 hours ago
Microsoft Copilot recently summarized and leaked user emails; but any AI agent will go above and beyond to complete assigned tasks, even breaking through their carefully designed guardrails.
Robert Lemos
Lessons From AI Hacking: Every Model, Every Layer Is Risky
4 days 12 hours ago
After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities.
Robert Lemos
Latin America's Cyber Maturity Lags Threat Landscape
4 days 16 hours ago
The slower pace of upgrades has the unintended impact of creating a haven for attackers, especially for initial access brokers and ransomware gangs.
Alexander Culafi
Emerging Chiplet Designs Spark Fresh Cybersecurity Challenges
5 days 7 hours ago
As scaled-down circuits with limited functions redefine computing for AI systems and autonomous vehicles, their flexibility demands new approaches to safeguard critical infrastructure.
Agam Shah
Supply Chain Attack Secretly Installs OpenClaw for Cline Users
5 days 7 hours ago
The malicious version of Cline's npm package — 2.3.0 — was downloaded more than 4,000 times before it was removed.
Rob Wright
Best-in-Class 'Starkiller' Phishing Kit Bypasses MFA
5 days 8 hours ago
A user-friendly PhaaS tool beats standard methods for detecting phishing attacks by live-proxying legitimate login sites.
Nate Nelson
Abu Dhabi Finance Week Exposed VIP Passport Details
5 days 9 hours ago
Unprotected cloud data sends the wrong signal at a time when the emirate's trying to attract investors and establish itself as a global financial center.
Jai Vijayan
Connected & Compromised: When IoT Devices Turn Into Threats
5 days 15 hours ago
Reused passwords, a lack of network segmentation, and poor sanitization processes make the Internet of Things' attack surfaces more dangerous.
Arielle Waldman
More Than 40% of South Africans Were Scammed in 2025
5 days 23 hours ago
Survey underscores the reality that scammers follow "scalable opportunities and low friction," rather than rich targets that tend to be better protected.
Nate Nelson
Checked
8 hours 22 minutes ago
Public RSS feed
darkreading feed