darkreading
Secure Your Spot at RSAC 2026 Conference
1 month hence
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
1 month hence
Zscaler-SquareX Deal Boosts Zero Trust, Secure Browsing Capabilities
2 days 14 hours ago
Zscaler's acquisition of SquareX comes as competitors like CrowdStrike and Palo Alto Networks are also investing in secure browser technologies.
Jeffrey Schwartz
Microsoft Under Pressure to Bolster Defenses for BYOVD Attacks
2 days 19 hours ago
Threat actors are exploiting security gaps to weaponize Windows drivers and terminate security processes in targeted networks, and there may be no easy fixes in sight.
Rob Wright
Nation-State Hackers Put Defense Industrial Base Under Siege
2 days 19 hours ago
Espionage groups from China, Russia and other nations burned at least two dozen zero-days in edge devices in attempts to infiltrate defense contractors' networks.
Robert Lemos, Contributing Writer
AI Agents 'Swarm,' Security Complexity Follows Suit
2 days 20 hours ago
As AI deployments scale and start to include packs of agents autonomously working in concert, organizations face a naturally amplified attack surface.
Alexander Culafi
Ivanti EPMM Zero-Day Bugs Spark Exploit Frenzy — Again
3 days 14 hours ago
It's time to phase out the "patch and pray" approach, eliminate needless public interfaces, and enforce authentication controls, one expert says.
Nate Nelson, Contributing Writer
Booz Allen Announces General Availability of Vellox Reverser to Automate Malware Defense
3 days 15 hours ago
The AI-powered product delivers expert-grade malware analysis and reverse engineering in minutes.
SpecterOps Launches BloodHound Scentry to Accelerate the Practice of Identity Attack Path Management
3 days 15 hours ago
Drawing on years of adversary tradecraft, SpecterOps experts work alongside customers to analyze and eliminate attack paths, protect critical assets, and stay ahead of emerging threats.
Gone With the Shame: One in Two Americans Are Reluctant to Talk About Romance Scam Incidents
3 days 15 hours ago
Men should take extra care on Valentine’s Day because they are nearly twice as likely as women to fall victim to romance scams.
Those 'Summarize With AI' Buttons May Be Lying to You
3 days 16 hours ago
Microsoft uncovered AI recommendation poisoning in 31 companies across 14 industries, and turnkey tools make it trivially easy to pull off.
Jai Vijayan, Contributing Writer
Senegalese Data Breaches Expose Lack of Security Maturity
4 days 3 hours ago
Green Blood Group steals personal records and biometric data of the West African nation's nearly 20 million residents.
Nate Nelson, Contributing Writer
North Korea's UNC1069 Hammers Crypto Firms With AI
4 days 15 hours ago
In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix.
Alexander Culafi
How to Stay on Top of Future Threats With a Cutting-Edge SOC
4 days 16 hours ago
CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security.
Richard Thurston
Automaker Secures the Supply Chain With Developer-Friendly Platform
4 days 17 hours ago
How a platform engineering team embeds supply chain security into infrastructure without slowing developers.
Joan Goodchild
AI Rising: Do We Know Enough About the Data Populating It?
4 days 22 hours ago
Organizations remain reluctant to address the fact that AI can dangerously expose business operations as well as personal data.
Adam Strange
Top Cyber Industry Defenses Spike CO2 Emissions
4 days 22 hours ago
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.
Nate Nelson, Contributing Writer
Asia Fumbles With Throttling Back Telnet Traffic in Region
5 days 10 hours ago
Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall, the region lagged in curbing Telnet traffic.
Robert Lemos, Contributing Writer
SolarWinds WHD Attacks Highlight Risks of Exposed Apps
5 days 14 hours ago
Organizations that have exposed their instances of Web Help Desk to the public Internet have inadvertently made them prime targets for attackers.
Rob Wright
Checked
54 minutes 39 seconds ago
Public RSS feed
darkreading feed