darkreading
China Upgrades the Backdoor It Uses to Spy on Telcos Globally
1 day 13 hours ago
Chinese APT Red Menshen's super-advanced BPFdoor malware defeats traditional cybersecurity protections. All telcos can do, really, is try hunting it down.
Nate Nelson
Wartime Usage of Compromised IP Cameras Highlight Their Danger
1 day 14 hours ago
The list of countries exploiting Internet-connected cameras to give them eyes inside their adversaries' borders continues to expand. What should companies look out for?
Robert Lemos
Infrastructure Attacks With Physical Consequences Down 25%
1 day 17 hours ago
Operational technology (OT) at industrial and critical infrastructure sites seem to have been benefitting from a lull in ransomware, and hackers' relative ignorance of OT systems.
Nate Nelson
Google Sets 2029 Deadline for Quantum-Safe Cryptography
1 day 17 hours ago
The post-quantum future may be coming sooner than you think, as Google plans to have PQC migration in place by 2029.
Alexander Culafi
Coruna, DarkSword & Democratizing Nation-State Exploit Kits
2 days 10 hours ago
Nation-state malware is being sold on the Dark Web and leaked to GitHub; and ordinary organizations might not stand much of a chance of defending themselves.
Nate Nelson
Is the FCC's Router Ban the Wrong Fix?
2 days 10 hours ago
The agency put foreign-made consumer routers on its list of prohibited communications devices, but the ban could create more problems down the road.
Jai Vijayan
Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles
2 days 10 hours ago
More than a decade since the 2015 Jeep hack, the cybersecurity of vehicles remains of the utmost importance.
Bree Fowler
Critical Flaw in Langflow AI Platform Under Attack
2 days 11 hours ago
Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizations have little time to address critical bugs.
Rob Wright
How Organizations Can Use Mistakes to Level Up Their Security Programs
2 days 15 hours ago
Organizations repeatedly expose ports, reuse passwords, and skip patches, creating security gaps that attackers exploit for breaches. An industry veteran outlines ways to fix these common mistakes.
Arielle Waldman
AI-Powered Dependency Decisions Introduce, Ignore Security Bugs
2 days 15 hours ago
AI models often hallucinate or make costly mistakes when tasked with recommending software versions, upgrade paths, and security fixes — leading to significant technical debt.
Rob Wright
Intermediaries Driving Global Spyware Market Expansion
2 days 18 hours ago
Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds.
Robert Lemos
At RSAC, the EU Leads While US Officials Are Sidelined
3 days 8 hours ago
While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today's top cybersecurity challenges.
Becky Bracken
Blame Game: Why Public Cyber Attribution Carries Risks
3 days 14 hours ago
Publicly accusing an entity of a cyberattack could have negative consequences that organizations should consider before taking the plunge.
Alexander Culafi
Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam
3 days 15 hours ago
A series of campaigns that began in August aim to defraud job candidates, using psychological tactics and data scraped from LinkedIn profiles.
Elizabeth Montalbano
AI Dominates RSAC Innovation Sandbox
3 days 15 hours ago
Ten finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year. Geordie AI wins the 2026 contest.
Fahmida Y. Rashid
SANS: Top 5 Most Dangerous New Attack Techniques to Watch
3 days 15 hours ago
For the first time, SANS Institute's five top attack techniques all have one thing in common — AI.
Becky Bracken
Why a 'Near-Miss' Database Is Key to Improving Information Sharing
3 days 16 hours ago
Organizations disclose attack details, though information may be limited. What if they did the same with close calls?
Arielle Waldman
AI-Native Security Is a Must to Counter AI-Based Attacks
3 days 18 hours ago
Attacks by artificial intelligence agents are a reality. Experts at Nvidia's GTC conference say defenders need to use the same tools to fight them off.
Agam Shah
Ex-NSA Directors Discuss 'Red Line' for Offensive Cyberattacks
3 days 18 hours ago
Four former NSA chiefs representing a near-complete history of US Cyber Command debate the role of offensive cyber in the government at RSAC.
Alexander Culafi
Checked
11 hours 33 minutes ago
Public RSS feed
darkreading feed