darkreading
[Virtual Event] Anatomy of a Data Breach: What to Do if it Happens to You
4 weeks hence
Infosecurity Europe
1 week 5 days hence
Cyber Pros Can't Decide If AI Is a Good or a Bad Thing
2 hours 5 minutes ago
There is nothing cybersecurity professionals are more excited about, and nothing they fear more, than AI.
Nate Nelson
GitHub Confirms Breach, 4K Internal Repos Stolen
2 hours 6 minutes ago
Open source software giant GitHub confirmed a data breach this week involving the theft of thousands of repos. One threat actor — TeamPCP — took credit.
Alexander Culafi
Fake Android Apps Commit Carrier Billing Fraud for Premium Svcs.
2 hours 22 minutes ago
The disguised apps use WebView automation, JavaScript injection, and OTP interception to avoid detection and complete fraudulent subscriptions.
Jai Vijayan
Processes and Culture Top Reasons Behind Data Breaches
5 hours 15 minutes ago
Government leaders revealed that, in spite of state laws meant to improve cyber hygiene, an analysis of incidents showed issues persist and visibility falls short.
Arielle Waldman
Patch Now: Critical Flaw in OT Robot OS Gives Attackers Control
6 hours 45 minutes ago
An unauthenticated attacker can exploit the command injection vulnerability to gain remote access to robotic systems, causing significant disruption to the environment.
Elizabeth Montalbano
Interpol's 'Operation Ramz' Pioneers Cross-Region Collabs in Middle East
15 hours 58 minutes ago
While the numbers are modest, the crackdown on cybercrime involved 13 countries in the MENA region, the largest law enforcement collaboration to date.
Robert Lemos
What It'll Take to Make AI BOMs Usable in a Modern Security Program
19 hours 13 minutes ago
Five ways CISOs can prepare for consuming AI Bill of Materials and influence the direction of how they're generated.
Ericka Chickowski, Contributing Writer
What Will Make AI BOMs Real?
1 day ago
A brief overview of the forces at play that will get more organizations on board with creating and consuming AI bill of materials (BOMs).
Ericka Chickowski, Contributing Writer
Verizon DBIR: Enterprises Face a Dangerous Vulnerability Glut
1 day 1 hour ago
Verizon's 2026 Data Breach Investigations Report (DBIR) finds that exploits are now involved in 31% of initial access for breaches, while patching lags too far behind the bad guys.
Alexander Culafi
Windows Zero-Day Barrage Continues After Patch Tuesday
1 day 1 hour ago
YellowKey, GreenPlasma, and MiniPlasma add to the growing list of vulnerabilities a security researcher disclosed over the past six weeks.
Jai Vijayan
CISA Exposes Secrets, Credentials in 'Private' Repo
1 day 3 hours ago
The agency's GitHub repository, publicly available since November 2025, was ironically named "Private-CISA."
Rob Wright
Stealer Spoofs Google, Microsoft & Apple, Then Backdoors macOS
1 day 3 hours ago
The SHub Reaper stealer, which hides behind fake WeChat and Miro installers, marks a shift from ClickFix social engineering to Apple script-based execution.
Elizabeth Montalbano
Looking Back, Looking Forward: Digesting a Dynamic Bouillabaisse of Cyber Evolution
1 day 9 hours ago
Dark Reading editors reflect on two decades of dramatic change — from perimeter defense to assume-breach strategies — and warn that while AI, cloud, and COVID-19 have transformed the threat landscape, organizations are still failing at fundamental security hygiene that could stop sophisticated attacks in their tracks.
Dark Reading Editorial Team
Is 2026 the Year AI Bills of Materials Get Real?
2 days 1 hour ago
Understanding AI BOMs and where they fit into risk management for artificial intelligence.
Ericka Chickowski, Contributing Writer
Microsoft Exchange Zero-Day Under Attack, No Patch Available
2 days 1 hour ago
CVE-2026-42897 stems from a cross-site scripting (XSS) vulnerability and can allow an attacker to compromise Outlook Web Access (OWA) mailboxes.
Rob Wright
'Claw Chain' Vulnerabilities Threaten OpenClaw Deployments
2 days 1 hour ago
The now-patched vulnerabilities in the rapidly growing AI agent framework allow attackers to steal credentials, escalate privileges, and maintain persistence.
Jai Vijayan
Shai-Hulud Worm Clones Spread After Code Release
2 days 3 hours ago
The release of Shai-Hulud source code spells trouble for software developers as researchers worry the self-replicating worm could scale.
Alexander Culafi
Checked
58 minutes ago
Public RSS feed
darkreading feed