darkreading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
1 month hence
LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut
14 hours 14 minutes ago
A newly released study exclusively shared with Dark Reading details the unique circumstances that make up Latin America's labor pool, and why organizations may want to expand their talent search.
Alexander Culafi
Cyberattacks Intensify Pressure on Latin American Governments
16 hours 21 minutes ago
Cyber threats across Latin America are increasingly targeting government systems, from disruptive attacks in Puerto Rico to a surge of probes against Colombia’s health sector.
Robert Lemos
Venom Stealer MaaS Platform Commoditizes ClickFix Attacks
18 hours 20 minutes ago
A new service on the cybercrime market provides automated capabilities to create persistent information-stealing social engineering attacks.
Elizabeth Montalbano
Are We Training AI Too Late?
22 hours 34 minutes ago
Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.
Nishawn Smagh
The Forgotten Endpoint: Security Risks of Dormant Devices
1 day 11 hours ago
Technology Talk: That forgotten notebook holds plenty of secrets to enterprise access.
Abib Oyebamiji
Axios NPM Package Compromised in Precision Attack
1 day 12 hours ago
The NPM package for Axios, a popular JavaScript HTTP client library, was briefly compromised this week, possibly by North Korean threat actors.
Alexander Culafi
Google's Vertex AI Is Over-Privileged. That's a Problem
1 day 12 hours ago
Palo Alto Networks researchers show how attackers could exploit AI agents on Google's Vertex AI to steal data and break into restricted cloud infrastructure.
Jai Vijayan
TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials
1 day 13 hours ago
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to compromised credentials.
Rob Wright
Rethinking Vulnerability Management Strategies for Mid-Market Security
1 day 17 hours ago
Intruder's Chris Wallis argues mid-market teams should prioritize CVE remediation speed over vulnerability counts, while expanding defenses beyond CVEs to include attack surface management.
Terry Sweeney
AI and Quantum Are Forcing a Rethink of Digital Trust
1 day 17 hours ago
In a conversation with Dark Reading’s Terry Sweeney, DigiCert CEO Amit Sinha explains how AI-driven identities and quantum threats are reshaping the foundations of digital trust.
Terry Sweeney
Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations
1 day 19 hours ago
Iranian APTs are blurring the lines between state-sponsored and cybercriminal activities to target high-impact US organizations.
Elizabeth Montalbano
AI-Powered 'DeepLoad' Malware Steals Credentials, Evades Detection
2 days 11 hours ago
The massive amount of junk code that hides the malware's logic from security scans was almost certainly generated by AI, researchers say.
Jai Vijayan
AI-Driven Code Surge Is Forcing a Rethink of AppSec
2 days 14 hours ago
In a conversation with Dark Reading’s Terry Sweeney, Black Duck CEO Jason Schmitt explains how AI is reshaping application security and why it must evolve to keep pace.
Terry Sweeney
F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation
2 days 14 hours ago
CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.
Rob Wright
F5 BIG-IP Vulnerability Reclassified as RCE, Under Exploitation
2 days 14 hours ago
CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.
Rob Wright
Manufacturing & Healthcare Share Struggles with Passwords
2 days 16 hours ago
The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.
Arielle Waldman
Storm Brews Over Critical, No-Click Telegram Flaw
2 days 18 hours ago
The vulnerability, which is allegedly triggered by a corrupted sticker in the messaging app, received a 9.8 CVSS score, but Telegram denies it exists.
Elizabeth Montalbano
China Upgrades the Backdoor It Uses to Spy on Telcos Globally
5 days 16 hours ago
Chinese APT Red Menshen's super-advanced BPFdoor malware defeats traditional cybersecurity protections. All telcos can do, really, is try hunting it down.
Nate Nelson
Checked
1 hour 14 minutes ago
Public RSS feed
darkreading feed