darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
3 weeks 5 days hence
Storm-1175 Deploys Medusa Ransomware at 'High Velocity'
18 hours 56 minutes ago
Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns predicated on speed.
Rob Wright
Grafana Patches AI Bug That Could Have Leaked User Data
19 hours 19 minutes ago
By hiding malicious instructions on an attacker-controlled Web page, AI could ingest orders as benign and return sensitive data to the attacker's server.
Alexander Culafi
RSAC 2026: How AI Is Reshaping Cybersecurity Faster Than Ever
1 day ago
Dark Reading's Kelly Jackson Higgins shares insights on the past, present, and future of cybersecurity after attending RSAC 2026 Conference.
Kristina Beek, Kelly Jackson Higgins
Human vs AI: Debates Shape RSAC 2026 Cybersecurity Trends
1 day ago
As AI dominated RSAC 2026, CISOs and industry leaders debated its role in security, from agentic applications to the challenges of scaling human involvement in decision-making.
Alexander Culafi, Kristina Beek
Lies, Damned Lies, and Cybersecurity Metrics
1 day ago
A panel of five C-suite leaders discuss how cybersecurity success is measured and why it isn't improving results.
Joan Goodchild
Focusing on the People in Cybersecurity at RSAC 2026 Conference
1 day 2 hours ago
AI dominated the RSAC 2026 Conference and showed it's still humans in cybersecurity who matter most.
Melinda Marks
AI-Assisted Supply Chain Attack Targets GitHub
1 day 17 hours ago
PRT-scan is the second campaign in recent months where a threat actor appears to have leveraged AI for automated targeting of a widespread GitHub misconfiguration.
Jai Vijayan
Axios Attack Shows Complex Social Engineering Is Industrialized
1 day 18 hours ago
The attack on the popular NPM package Axios is just one of many targeting maintainers and has shone a light on how threat actors can scale sophisticated social engineering campaigns.
Alexander Culafi
Fortinet Issues Emergency Patch for FortiClient Zero-Day
1 day 18 hours ago
The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild.
Rob Wright
Automated Credential Harvesting Campaign Exploits React2Shell Flaw
1 day 23 hours ago
An emerging threat cluster tracked as UAT-10608 is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to exfiltrate credentials, secrets, and other system data.
Elizabeth Montalbano
Shadow AI in Healthcare Is Here to Stay
2 days 1 hour ago
Medical professionals are not going to stop using AI tools to manage growing workloads. Organizations should prioritize bolstering security protocols to limit their blast radius.
Arielle Waldman
OWASP GenAI Security Project Gets Update, New Tools Matrix
2 days 1 hour ago
In recognition of 21 generative AI risks, the standards groups recommends that companies take separate but linked approaches to defending GenAI and agentic AI systems.
Robert Lemos
Inconsistent Privacy Labels Don't Tell Users What They Are Getting
4 days 18 hours ago
Data privacy labels are a great idea for mobile apps, but the current versions just aren't good enough.
Bree Fowler
Apple Breaks Precedent, Patches DarkSword for iOS 18
4 days 22 hours ago
Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.
Nate Nelson
Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting
5 days ago
As organizations disclose breaches tied to TeamPCP's supply chain attacks, ShinyHunters and Lapsus$ are getting involved, taking credit, and creating a murky situation for enterprises.
Rob Wright
Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication
5 days 1 hour ago
"Skull vibration harmonics generated by vital signs" can be used to sign in to VR, AR, and MR headsets, according to emerging research.
Alexander Culafi
Claude Source Code Leak Highlights Big Supply Chain Missteps
5 days 2 hours ago
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.
Robert Lemos
Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain
5 days 2 hours ago
The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open source artifacts across containers, libraries, agent skills, and GitHub Actions.
Jeffrey Schwartz
Checked
11 hours 10 minutes ago
Public RSS feed
darkreading feed