darkreading
Secure Your Spot at RSAC 2026 Conference
1 month 3 weeks hence
Sandworm Blamed for Wiper Attack on Poland Power Grid
10 hours 43 minutes ago
Researchers attributed the failed attempt to the infamous Russian APT Sandworm, which is notorious for wiper attacks on critical infrastructure organizations.
Alexander Culafi
DPRK's Konni Targets Blockchain Developers With AI-Generated Backdoor
16 hours 26 minutes ago
The North Korean threat group is using a new PowerShell backdoor to compromise development environments and target cryptocurrency holdings, according to researchers.
Elizabeth Montalbano, Contributing Writer
2025 Was a Wake-up Call to Protect Human Decisions, Not Just Systems
3 days 7 hours ago
Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures.
Rashmi Tallapragada
Swipe, Plug-in, Pwned: Researchers Find New Ways to Hack Vehicles
3 days 11 hours ago
Security researchers exploited dozens of vulnerabilities in vehicle infotainment systems and EV chargers during the latest Pwn2Own contest at Automotive World 2026.
Robert Lemos, Contributing Writer
Exploited Zero-Day Flaw in Cisco UC Could Affect Millions
3 days 11 hours ago
Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover.
Rob Wright
Europe's GCVE Raises Concerns Over Fragmentation in Vulnerability Databases
3 days 11 hours ago
GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders.
Arielle Waldman
Healthy Security Cultures Want People to Report Risks
3 days 15 hours ago
The signs of an effective security culture are shifting as companies call on CISOs and security teams to raise their hands unabashedly.
Arielle Waldman
Risky Chinese Electric Buses Spark Aussie Gov't Review
4 days 10 hours ago
Deployed across Australia and Europe, China's electric buses are vulnerable to cybercriminals and sport remote connectivity some worry the Chinese state could exploit.
Nate Nelson, Contributing Writer
Fortinet Firewalls Hit With Malicious Configuration Changes
4 days 10 hours ago
Automated infections of potentially fully patched FortiGate devices are allowing threat actors to steal firewall configuration files.
Rob Wright
From a Whisper to a Scream: Europe Frets About Overreliance on US Tech
4 days 14 hours ago
Concern is growing across Europe about relying on US cybersecurity companies, and Greenland takeover talk is eroding trust across the EU even further.
Rik Turner
Latin American Orgs Lack Confidence in Cyber Defenses, Skills
4 days 16 hours ago
Cybersecurity professionals in Latin America are least likely to have faith in their countries' preparedness for cyberattacks on critical infrastructure, the World Economic Forum says.
Robert Lemos, Contributing Writer
DPRK Actors Deploy VS Code Tunnels for Remote Hacking
4 days 18 hours ago
A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to avoid detection.
Elizabeth Montalbano, Contributing Writer
Dark Reading Confidential: Reviving the Hacker Ethos That Built Cybersecurity
5 days 7 hours ago
Dark Reading Confidential Episode 14: How curious, ethical problem-solving can continue to serve as a guiding principle for an evolving cybersecurity sector.
Dark Reading Staff
Dark Reading Confidential: Reviving the Hacker Ethos That Built Cybersecurity
5 days 7 hours ago
Dark Reading Confidential Episode 14: How curious, ethical problem-solving can continue to serve as a guiding principle for an evolving cybersecurity sector.
Dark Reading Staff
AI Agents Undermine Progress in Browser Security
5 days 9 hours ago
Web browser companies have put in substantial effort over the past three decades to strengthen the browser security stack against abuses. Agentic browsers are undoing all that work.
Robert Lemos, Contributing Writer
'Contagious Interview' Attack Now Delivers Backdoor Via VS Code
5 days 10 hours ago
Once trust is granted to the repository's author, a malicious app executes arbitrary commands on the victim's system with no other user interaction.
Jai Vijayan, Contributing Writer
Phishing Campaign Zeroes in on LastPass Customers
5 days 11 hours ago
The bait incudes plausible subject lines and credible messages, most likely thanks to attackers' use of large language models to craft them.
Alexander Culafi
Complex VoidLink Linux Malware Created by AI
5 days 17 hours ago
Researchers say the advanced framework was built almost entirely by agents, marking a significant evolution in the use of AI to develop wholly original malware.
Elizabeth Montalbano, Contributing Writer
Checked
8 hours 13 minutes ago
Public RSS feed
darkreading feed