darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
1 month hence
LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut
22 hours 27 minutes ago
A newly released study exclusively shared with Dark Reading details the unique circumstances that make up Latin America's labor pool, and why organizations may want to expand their talent search.
Alexander Culafi
Cyberattacks Intensify Pressure on Latin American Governments
1 day ago
Cyber threats across Latin America are increasingly targeting government systems, from disruptive attacks in Puerto Rico to a surge of probes against Colombia’s health sector.
Robert Lemos
Venom Stealer MaaS Platform Commoditizes ClickFix Attacks
1 day 2 hours ago
A new service on the cybercrime market provides automated capabilities to create persistent information-stealing social engineering attacks.
Elizabeth Montalbano
Are We Training AI Too Late?
1 day 6 hours ago
Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.
Nishawn Smagh
The Forgotten Endpoint: Security Risks of Dormant Devices
1 day 19 hours ago
Technology Talk: That forgotten notebook holds plenty of secrets to enterprise access.
Abib Oyebamiji
Axios NPM Package Compromised in Precision Attack
1 day 20 hours ago
The NPM package for Axios, a popular JavaScript HTTP client library, was briefly compromised this week, possibly by North Korean threat actors.
Alexander Culafi
Google's Vertex AI Is Over-Privileged. That's a Problem
1 day 21 hours ago
Palo Alto Networks researchers show how attackers could exploit AI agents on Google's Vertex AI to steal data and break into restricted cloud infrastructure.
Jai Vijayan
TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials
1 day 21 hours ago
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to compromised credentials.
Rob Wright
Rethinking Vulnerability Management Strategies for Mid-Market Security
2 days 1 hour ago
Intruder's Chris Wallis argues mid-market teams should prioritize CVE remediation speed over vulnerability counts, while expanding defenses beyond CVEs to include attack surface management.
Terry Sweeney
AI and Quantum Are Forcing a Rethink of Digital Trust
2 days 1 hour ago
In a conversation with Dark Reading’s Terry Sweeney, DigiCert CEO Amit Sinha explains how AI-driven identities and quantum threats are reshaping the foundations of digital trust.
Terry Sweeney
Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations
2 days 3 hours ago
Iranian APTs are blurring the lines between state-sponsored and cybercriminal activities to target high-impact US organizations.
Elizabeth Montalbano
AI-Powered 'DeepLoad' Malware Steals Credentials, Evades Detection
2 days 20 hours ago
The massive amount of junk code that hides the malware's logic from security scans was almost certainly generated by AI, researchers say.
Jai Vijayan
AI-Driven Code Surge Is Forcing a Rethink of AppSec
2 days 22 hours ago
In a conversation with Dark Reading’s Terry Sweeney, Black Duck CEO Jason Schmitt explains how AI is reshaping application security and why it must evolve to keep pace.
Terry Sweeney
F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation
2 days 23 hours ago
CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.
Rob Wright
F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation
2 days 23 hours ago
CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.
Rob Wright
Manufacturing & Healthcare Share Struggles with Passwords
3 days 1 hour ago
The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.
Arielle Waldman
Storm Brews Over Critical, No-Click Telegram Flaw
3 days 2 hours ago
The vulnerability, which is allegedly triggered by a corrupted sticker in the messaging app, received a 9.8 CVSS score, but Telegram denies it exists.
Elizabeth Montalbano
China Upgrades the Backdoor It Uses to Spy on Telcos Globally
6 days ago
Chinese APT Red Menshen's super-advanced BPFdoor malware defeats traditional cybersecurity protections. All telcos can do, really, is try hunting it down.
Nate Nelson
Checked
9 hours 27 minutes ago
Public RSS feed
darkreading feed