darkreading
Secure Your Spot at RSAC 2026 Conference
1 month 3 weeks hence
2025 Was a Wake-Up Call to Protect Human Decisions, Not Just Systems
2 days 18 hours ago
Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures.
Rashmi Tallapragada
Swipe, Plug-in, Pwned: Researchers Find New Ways to Hack Vehicles
2 days 22 hours ago
Security researchers exploited dozens of vulnerabilities in vehicle infotainment systems and EV chargers during the latest Pwn2Own contest at Automotive World 2026.
Robert Lemos, Contributing Writer
Exploited Zero-Day Flaw in Cisco UC Could Affect Millions
2 days 22 hours ago
Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover.
Rob Wright
Europe's GCVE Raises Concerns Over Fragmentation in Vulnerability Databases
2 days 23 hours ago
GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders.
Arielle Waldman
Healthy Security Cultures Want People to Report Risks
3 days 3 hours ago
The signs of an effective security culture are shifting as companies call on CISOs and security teams to raise their hands unabashedly.
Arielle Waldman
Risky Chinese Electric Buses Spark Aussie Gov't Review
3 days 21 hours ago
Deployed across Australia and Europe, China's electric buses are vulnerable to cybercriminals and sport remote connectivity some worry the Chinese state could exploit.
Nate Nelson, Contributing Writer
Fortinet Firewalls Hit With Malicious Configuration Changes
3 days 22 hours ago
Automated infections of potentially fully patched FortiGate devices are allowing threat actors to steal firewall configuration files.
Rob Wright
From a Whisper to a Scream: Europe Frets About Overreliance on US Tech
4 days 1 hour ago
Concern is growing across Europe about relying on US cybersecurity companies, and Greenland takeover talk is eroding trust across the EU even further.
Rik Turner
Latin American Orgs Lack Confidence in Cyber Defenses, Skills
4 days 3 hours ago
Cybersecurity professionals in Latin America are least likely to have faith in their countries' preparedness for cyberattacks on critical infrastructure, the World Economic Forum says.
Robert Lemos, Contributing Writer
DPRK Actors Deploy VS Code Tunnels for Remote Hacking
4 days 5 hours ago
A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to avoid detection.
Elizabeth Montalbano, Contributing Writer
Dark Reading Confidential: Reviving the Hacker Ethos That Built Cybersecurity
4 days 19 hours ago
Dark Reading Confidential Episode 14: How curious, ethical problem-solving can continue to serve as a guiding principle for an evolving cybersecurity sector.
Dark Reading Staff
AI Agents Undermine Progress in Browser Security
4 days 20 hours ago
Web browser companies have put in substantial effort over the past three decades to strengthen the browser security stack against abuses. Agentic browsers are undoing all that work.
Robert Lemos, Contributing Writer
'Contagious Interview' Attack Now Delivers Backdoor Via VS Code
4 days 21 hours ago
Once trust is granted to the repository's author, a malicious app executes arbitrary commands on the victim's system with no other user interaction.
Jai Vijayan, Contributing Writer
Phishing Campaign Zeroes in on LastPass Customers
4 days 23 hours ago
The bait incudes plausible subject lines and credible messages, most likely thanks to attackers' use of large language models to craft them.
Alexander Culafi
Complex VoidLink Linux Malware Created by AI
5 days 5 hours ago
Researchers say the advanced framework was built almost entirely by agents, marking a significant evolution in the use of AI to develop wholly original malware.
Elizabeth Montalbano, Contributing Writer
'Damn Vulnerable' Training Apps Leave Vendors' Clouds Exposed
5 days 5 hours ago
Hackers are already leveraging these over-permissioned programs to access the IT systems of major security vendors.
Nate Nelson, Contributing Writer
'CrashFix' Scam Crashes Browsers, Delivers Malware
5 days 22 hours ago
The attack consists of a NexShield malicious browser extension, a social engineering technique to crash the browser, and a Python-based RAT.
Jai Vijayan, Contributing Writer
Mass Spam Attacks Leverage Zendesk Instances
5 days 23 hours ago
The CRM vendor advised ignoring or deleting suspicious emails and said the attacks were not tied to any breach or software vulnerability.
Alexander Culafi
Checked
3 hours 47 minutes ago
Public RSS feed
darkreading feed