darkreading
AI-Powered 'DeepLoad' Malware Steals Credentials, Evades Detection
15 hours 50 minutes ago
The massive amount of junk code that hides the malware's logic from security scans was almost certainly generated by AI, researchers say.
Jai Vijayan
F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation
18 hours 51 minutes ago
CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.
Rob Wright
Manufacturing and Healthcare Share Struggles with Passwords
20 hours 49 minutes ago
The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.
Arielle Waldman
Storm Brews Over Critical, No-Click Telegram Flaw
22 hours 13 minutes ago
The vulnerability, which is allegedly triggered by a corrupted sticker in the messaging app, received a 9.8 CVSS score, but Telegram denies it exists.
Elizabeth Montalbano
China Upgrades the Backdoor It Uses to Spy on Telcos Globally
3 days 20 hours ago
Chinese APT Red Menshen's super-advanced BPFdoor malware defeats traditional cybersecurity protections. All telcos can do, really, is try hunting it down.
Nate Nelson
Wartime Usage of Compromised IP Cameras Highlight Their Danger
3 days 20 hours ago
The list of countries exploiting Internet-connected cameras to give them eyes inside their adversaries' borders continues to expand. What should companies look out for?
Robert Lemos
Infrastructure Attacks With Physical Consequences Down 25%
3 days 23 hours ago
Operational technology (OT) at industrial and critical infrastructure sites seem to have been benefitting from a lull in ransomware, and hackers' relative ignorance of OT systems.
Nate Nelson
Google Sets 2029 Deadline for Quantum-Safe Cryptography
4 days ago
The post-quantum future may be coming sooner than you think, as Google plans to have PQC migration in place by 2029.
Alexander Culafi
Coruna, DarkSword & Democratizing Nation-State Exploit Kits
4 days 17 hours ago
Nation-state malware is being sold on the Dark Web and leaked to GitHub; and ordinary organizations might not stand much of a chance of defending themselves.
Nate Nelson
Is the FCC's Router Ban the Wrong Fix?
4 days 17 hours ago
The agency put foreign-made consumer routers on its list of prohibited communications devices, but the ban could create more problems down the road.
Jai Vijayan
Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles
4 days 17 hours ago
More than a decade since the 2015 Jeep hack, the cybersecurity of vehicles remains of the utmost importance.
Bree Fowler
Critical Flaw in Langflow AI Platform Under Attack
4 days 18 hours ago
Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizations have little time to address critical bugs.
Rob Wright
How Organizations Can Use Mistakes to Level Up Their Security Programs
4 days 21 hours ago
Organizations repeatedly expose ports, reuse passwords, and skip patches, creating security gaps that attackers exploit for breaches. An industry veteran outlines ways to fix these common mistakes.
Arielle Waldman
AI-Powered Dependency Decisions Introduce, Ignore Security Bugs
4 days 22 hours ago
AI models often hallucinate or make costly mistakes when tasked with recommending software versions, upgrade paths, and security fixes — leading to significant technical debt.
Rob Wright
Intermediaries Driving Global Spyware Market Expansion
5 days 1 hour ago
Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds.
Robert Lemos
At RSAC, the EU Leads While US Officials Are Sidelined
5 days 15 hours ago
While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today's top cybersecurity challenges.
Becky Bracken
Blame Game: Why Public Cyber Attribution Carries Risks
5 days 21 hours ago
Publicly accusing an entity of a cyberattack could have negative consequences that organizations should consider before taking the plunge.
Alexander Culafi
Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam
5 days 22 hours ago
A series of campaigns that began in August aim to defraud job candidates, using psychological tactics and data scraped from LinkedIn profiles.
Elizabeth Montalbano
AI Dominates RSAC Innovation Sandbox
5 days 22 hours ago
Ten finalists had three minutes to make their case for being the most innovative, promising young security company of the year. Geordie AI wins the 2026 contest.
Fahmida Y. Rashid
Checked
6 hours 15 minutes ago
Public RSS feed
darkreading feed