darkreading
Port Raises $35M for its End-to-End Internal Developer Portal
1 month 1 week ago
Bad Actors Manipulate Red-Team Tools to Evade Detection
1 month 1 week ago
By using EDRSilencer, threat actors are able to prevent security alerts and reports getting generated.
Dark Reading Staff
Hybrid Work Exposes New Vulnerabilities in Print Security
1 month 1 week ago
The shift to a distributed work model has exposed organizations to new threats, and a low but continuing stream of printer-related vulnerabilities isn't helping.
Jai Vijayan, Contributing Writer
Cyber Gangs Aren't Afraid of Prosecution
1 month 1 week ago
Challenges with cybercrime prosecution are making it easier for attackers to act with impunity. Law enforcement needs to catch up.
Ilia Kolochenko
What Cybersecurity Leaders Can Learn From the Game of Golf
1 month 1 week ago
As in golf, security requires collaboration across the entire organization, from individual contributors in each department to the executive level and the board.
Jeff Shiner
Sidewinder Casts Wide Geographic Net in Latest Attack Spree
1 month 1 week ago
The long-active, India-sponsored cyber-threat group targeted multiple entities across Asia, Africa, the Middle East, and even Europe in a recent attack wave that demonstrated the use of a previously unknown post-exploit tool called StealerBot.
Elizabeth Montalbano, Contributing Writer
North Korea Hackers Get Cash Fast in Linux Cyber Heists
1 month 1 week ago
The thieves modify transaction messages to initiate unauthorized withdrawals, even when there are insufficient funds.
Dark Reading Staff
FHE Consortium Pushes for Quantum-Resilient Cryptography Standards
1 month 1 week ago
The FHE Technical Consortium for Hardware (FHETCH) brings together developers, hardware manufacturers, and cloud providers to collaborate on technical standards necessary to develop commercial fully homomorphic encryption solutions and lower adoption barriers.
Jennifer Lawinski, Contributing Writer
Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity
1 month 1 week ago
Organizations should be on high alert until next month's US presidential election to ensure the integrity of the voting process, researchers warn.
Elizabeth Montalbano, Contributing Writer
LLMs Are a New Type of Insider Adversary
1 month 1 week ago
The inherent intelligence of large language models gives them unprecedented capabilities like no other enterprise tool before.
Shaked Reiner
WP Engine Accuses WordPress of 'Forcibly' Taking Over Its Plug-in
1 month 1 week ago
WordPress moves could have security implications for sites using Advanced Custom Fields plug-in.
Jai Vijayan, Contributing Writer
CISOs' Privacy Responsibilities Keep Growing
1 month 1 week ago
A heated regulatory landscape, uncertainty over AI use, and how it all ties back to cybersecurity means CISOs have to add privacy to their portfolios.
Joan Goodchild
Even Orgs With SSO Are Vulnerable to Identity-Based Attacks
1 month 1 week ago
Use SSO, don't use SSO. Have MFA, don't have MFA. An analysis of a snapshot of organizations using Push Security's platform finds that 99% of accounts are susceptible to phishing attacks.
Edge Editors
Southeast Asian Cybercrime Profits Fuel Shadow Economy
1 month 1 week ago
With cybercriminal gangs raking in at least $18 billion regionally — and much more globally — law enforcement and policymakers are struggling to keep up as the syndicates innovate and entrench themselves in national economies.
Robert Lemos, Contributing Writer
Serious Adversaries Circle Ivanti CSA Zero-Day Flaws
1 month 1 week ago
Suspected nation-state actors are spotted stringing together three different zero-days in the Ivanti Cloud Services Application to gain persistent access to a targeted system.
Dark Reading Staff
Pokémon Gaming Company Employee Info Leaked in Hack
1 month 1 week ago
The gaming company reports that the server has been rebuilt after the leak, but has not confirmed if its insider video game data was leaked.
Dark Reading Staff
The Lingering 'Beige Desktop' Paradox
1 month 1 week ago
Organizations are grappling with the risks of having outdated hardware handling core workloads, mission-critical applications no one knows how to update or maintain, and systems that IT and security teams don't know about.
Dave Lewis
Microsoft: Schools Grapple With Thousands of Cyberattacks Weekly
1 month 1 week ago
Education, including K-12 schools and universities, has become the third most targeted sector due to the high variety of sensitive data it stores in its databases.
Dark Reading Staff
ConfusedPilot Attack Can Manipulate RAG-Based AI Systems
1 month 1 week ago
Attackers can introduce a malicious document in systems such as Microsoft 365 Copilot to confuse the system, potentially leading to widespread misinformation and compromised decision-making processes.
Elizabeth Montalbano, Contributing Writer
Checked
1 hour 30 minutes ago
Public RSS feed
darkreading feed