darkreading
Secure Your Spot at RSAC 2026 Conference
1 week 5 days hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
1 week 2 days hence
White House Cyber Strategy Prioritizes Offense
14 hours 11 minutes ago
In a seven-page strategy document, the Trump administration signaled a shift to preemption and deterrence to handling cyber threats.
Jai Vijayan
'InstallFix' Attacks Spread Fake Claude Code Sites
14 hours 38 minutes ago
A fresh cyberattack campaign blends malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces.
Rob Wright
Are We Ready for Auto Remediation With Agentic AI?
15 hours 7 minutes ago
With the rapid innovations in AI, we are entering an exciting era of automated risk remediation. Learn about security team readiness to leverage agentic AI for threat and exposure management.
Melinda Marks
Chinese Cyber Threat Lurks In Critical Asian Sectors for Years
23 hours 15 minutes ago
An undefined Chinese-speaking actor wields a combo of custom malware, open source tools, and LOTL binaries against Windows and Linux, likely for spying.
Elizabeth Montalbano
Cylake Offers AI-Native Security Without Relying on Cloud Services
3 days 16 hours ago
Cylake's platform will analyze security data locally and identify potential attacks for organizations concerned about data sovereignty.
Dark Reading Staff
North Korean APTs Use AI to Enhance IT Worker Scams
3 days 17 hours ago
DPRK worker scams are old hat, but they're still working, thanks to AI tools that help with everything from face swapping to daily emails.
Nate Nelson
EU Auto Rules Shift Gears on Cybersecurity Standards
3 days 20 hours ago
The European Union is taking new precautions as climate change and cybersecurity threats rise across the automotive industry.
Arielle Waldman
Iran's Cyber-Kinetic War Doctrine Takes Shape
3 days 21 hours ago
Iran has been hacking IP cameras to plan missile strikes against its enemies, and mounting other attacks on physical assets, showing how cyber and kinetic warfare are fast becoming one and the same.
Alexander Culafi
Cyberattack on Mexico's Gov't Agencies Highlight AI Threat
3 days 21 hours ago
Using Anthropic's Claude, OpenAI's ChatGPT, and a detailed playbook prompt, a handful of cyberattackers reportedly gained access to government agencies and its citizens' data.
Robert Lemos
Nation-State Actor Embraces AI Malware Assembly Line
4 days 13 hours ago
Pakistan's APT36 threat group has begun using vibe-coding to churn out mediocre malware, but at a scale that could overwhelm defenses.
Jai Vijayan
Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform
4 days 13 hours ago
The phishing-as-a-service platform was popular among cyber threat actors because of its ability to bypass multifactor authentication defenses.
Rob Wright
Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
4 days 15 hours ago
Edge bugs are so fetch, and Cisco just patched 50 new ones, including some heavy hitters with 10 out of 10 scores on the CVSS scale.
Nate Nelson
Fig Security Emerges From Stealth to Fix Broken Security Operations
4 days 18 hours ago
Fig Security's platform traces security data flows end-to-end across SIEMs, pipelines, and response systems to alert teams before infrastructure changes break critical defenses.
Dark Reading Staff
Software Development Practices Help Enterprises Tackle Real-Life Risks
4 days 18 hours ago
Organizations can borrow secure-by-design processes to manage non-technical challenges like governance or the inevitable human error.
Arielle Waldman
LatAm Now Faces 2x More Cyberattacks Than US
4 days 21 hours ago
Much of Central and South America struggles with cybersecurity maturity, and hackers are taking advantage.
Nate Nelson
VMware Aria Operations Bug Exploited, Cloud Resources at Risk
5 days 14 hours ago
Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.
Alexander Culafi
Stranger Things Meets Cybersecurity: Lessons from the Hive Mind
5 days 18 hours ago
Events and concepts from the Stranger Things television series illustrate how enterprises can defend their networks and stay "right side up."
Nadir Izrael
Checked
2 hours 20 minutes ago
Public RSS feed
darkreading feed