0

Tables Turn on 'The Gentlemen' RaaS Gang With Data Leak

Thứ Tư, 13 tháng 5, 2026
An OPSEC failure provides a window into what helped the ransomware group rise: a generous affiliate model, opportunistic TTPs, and an effective organizational structure.
0

Dark Reading Celebrates 20 Years as a Leading Authority on Cybersecurity, Highlighting the People, Events, Ideas, and Technologies Shaping the Modern Risk Landscape

Informa TechTarget's flagship cybersecurity media brand launches a special content series to mark two decades as a trusted source for cybersecurity professionals.
0

China's 'FamousSparrow' APT Nests in South Caucasus Energy Firm

The cyberthreat group targets an Azerbaijani oil and gas firm with repeated attacks, as the China-linked actors extend targeting beyond hospitality, telecom, and government sectors.
0

It's Patch Tuesday for Microsoft and Not a Zero-Day In Sight

Thứ Ba, 12 tháng 5, 2026
It's the first time in two years with no zero-days. But with 137 flaws to patch, including nine critical ones, admins still have plenty of work to do.
0

Hugging Face Packages Weaponized With a Single File Tweak

A tokenizer library file present in Hugging Face AI models can be manipulated to hijack the model's outputs and exfiltrate data.
0

20 Leaders Who Built the CISO Era: 2 Decades of Change

As part of Dark Reading's 20th anniversary special coverage, we profile the CISOs, founders, researchers, criminals, and policymakers who rewrote the enterprise risk playbook.
0

Tech Can't Stop These Threats — Your People Can

Thứ Hai, 11 tháng 5, 2026
Security controls can do only so much. Here are four attacks where your employees are usually your first, and only, line of cyber defense.
0

'Dirty Frag' Exploit Poised to Blow Up on Enterprise Linux Distros

The privilege escalation vulnerability, which is similar to other Linux flaws like Copy Fail and Dirty Pipe, may already be under limited exploitation.
0

Hackers Use AI for Exploit Development, Attack Automation

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate complex attacks.
0

Cyber Espionage Group Targets Aviation Firms to Steal Map Data

The campaign quietly compromises aerospace and drone operators to exfiltrate GIS files, terrain models, and GPS data and gain a clear picture of adversaries' world view.
0

ShinyHunters Claims Second Attack Against Instructure

Thứ Sáu, 8 tháng 5, 2026
The edtech company is struggling to wrest control from its hackers. PII belonging to hundreds of millions of people is on the line.
0

Shifting Budget Dynamics for Identity Security and AI Agents

AI agent projects are proliferating throughout the enterprise, and those AI agent identities require management, security, and governance. New Omdia research shows the AI agent identity budget dynamics are very different than traditional IAM projects.
0

After Replacing TeamPCP Malware, 'PCPJack' Steals Cloud Secrets

Thứ Năm, 7 tháng 5, 2026
PCPJack makes innovative use of parquet files for stealthy, pre-validated target discovery as it canvasses multiple cloud environments.
0

Has CISA Finally Found Its New Leader in Tom Parker?

Dark Reading investigates rumors that Tom Parker, a board room 'operator' and longtime cyber exec, could be next in line to take over CISA.
0

'TrustFall' Convention Exposes Claude Code Execution Risk

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal or no user interaction, thanks to skimpy warning dialogs.
0

Instructure Breach Exposes Schools' Vendor Dependence

Thứ Tư, 6 tháng 5, 2026
ShinyHunters' attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into their vendors.
0

Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations

The UC Berkeley Center for Long-Term Cybersecurity (CLTC) offers tools and support to schools, local governments, and non-profits as they defend themselves against a growing volume of cyberattacks.
0

Why Security Leadership Makes or Breaks a Pen Test

Well-run security drills go beyond checking audit boxes to identify and address trouble spots. Effective leaders can ensure proper scope, access, and follow-through, but it’s not easy.
0

Middle East Cyber Battle Field Broadens — Especially in UAE

Thứ Ba, 5 tháng 5, 2026
As the war with Iran continues, breach attempts targeting the United Arab Emirates tripled in a few weeks — many targeting critical infrastructure.
0

Trellix Source Code Breach Highlights Growing Supply Chain Threats

Info is scant, but such breaches can reveal where a security product's controls are located and how detections are designed, giving attackers a leg up.
0

Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity.
0

How the Story of a USB Penetration Test Went Viral

Two decades ago Dark Reading posted its first blockbuster — a column by a pen tester who sprinkled rigged thumb drives around a credit union parking lot and let curious employees do the rest. This episode looks back at the history-making piece with its author Steve Stasiukonis, Dark Reading senior editor Becky Bracken, and Dark Reading's editor-in-chief Kelly Jackson Higgins.
0

RMM Tools Fuel Stealthy Phishing Campaign

Thứ Hai, 4 tháng 5, 2026
Attackers are abusing two remote monitoring and management (RMM) tools to evade detection in a campaign that has impacted over 80 organizations so far.
0

Exploit Cyber-Frenzy Threatens Millions via Critical cPanel Vulnerability

Shortly after the authentication-bypass flaw was disclosed multiple proof-of-concept exploits appeared, and one researcher claims there's been zero-day activity for at least a month.
0

Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia

More than 1,600 socially engineered messages from the China-backed advanced persistent threat (APT) group target various sectors to deliver the previously undocumented ABCDoor backdoor, ValleyRAT, and other malware.
0

How Dark Reading Lifted Off the Launchpad in 2006

Twenty years ago, this media brand didn't have a print edition to attract eyeballs and sponsors. Top-notch content and editorial talent did the heavy lifting.
0

76% of All Crypto Stolen in 2026 Is Now in North Korea

Thứ Sáu, 1 tháng 5, 2026
North Korean threat actors are pulling off historic cryptocurrency heists on a yearly, sometimes weekly basis now. AI might be helping them.
0

20 Years in Cyber: Dark Reading Marks Milestone With Month of Special Coverage

On this day in 2006, Dark Reading went live. We have a celebration planned that spans our two decades of covering the industry, and you, dear readers, are invited.
0

Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug

Thứ Năm, 30 tháng 4, 2026
The proof-of-concept exploit code runs only 10 lines long, but luckily, a patch is already available.
0

Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber

In this latest installment of the Reporters' Notebook video series, we discuss how the new AI model threatens to completely upend cybersecurity, and what industry leaders are telling the press.
0

Oracle Red Bull Racing Team Revs Up Automation to Boost Security

While drivers race to shave off seconds on the track, the team's IT and engineering staff are speeding up how they deliver security.
0

Claude Mythos Fears Startle Japan's Financial Services Sector

Thứ Tư, 29 tháng 4, 2026
Global financial institutions are panicked over Anthropic's new superhacker AI model. Cyber experts aren't quite as worried.
0

Reverse Engineering With AI Unearths High-Severity GitHub Bug

Wiz used an AI reverse-engineering tool to pinpoint a vulnerability that previously would have been too costly and time-consuming to undertake.
0

AI Finds 38 Security Flaws in Electronic Health Record Platform

Flaws in OpenEMR's platform — used by more than 100,000 healthcare providers — enabled database compromise, remote code execution, and data theft.
0

BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures

Thứ Ba, 28 tháng 4, 2026
The North Korean group is using stolen victim videos, AI-generated avatars, and fake Zoom calls to scale malware attacks against cryptocurrency executives.
0

NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later

Chris Inglis was the head civilian in charge at the NSA when the Snowden leak exploded. He gets candid about mistakes the organization made, and what CISOs need to know about spotting potential threats, media disclosures, and "enculturation."
0

Feuding Ransomware Groups Leak Each Other's Data

When 0APT and KryBit attacked each other, they exposed infrastructure and operational data, giving defenders rare insight into ransomware operations.
0

Vidar Rises to Top of Chaotic Infostealer Market

The malware has filled the gap created by last year's law enforcement takedowns of Lumma and Rhadamanthys.
0

Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain

Attackers continue to scale a campaign to seed Open VSX with seemingly benign VS Code extensions that spread self-propagating malware.
0

UNC6692 Combines Social Engineering, Malware, Cloud Abuse

Thứ Hai, 27 tháng 4, 2026
A newly discovered threat actor is using Microsoft Teams, AWS S3 buckets, and custom "Snow" malware in a multipronged campaign.
0

Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation

A researcher discovered five different exploit paths that stem from an architectural weakness in how Windows' Remote Procedure Call (RPC) mechanism handles connections to unavailable services.
0

Parsing Agentic Offensive Security's Existential Threat

Some fear frontier LLMs like Claude Mythos and Anthropic's GPT-5.5 will lead to cybersecurity annihilation. Ari Herbert-Voss notes this could be an opportunity.
0

Helping Romance Scam Victims Require a Proactive, Empathic Approach

Chủ Nhật, 26 tháng 4, 2026
People targeted by confidence schemes find getting help is a lonely road. Experts want law enforcement, financial and government institutions to work together and protect them.
0

US Busts Myanmar Ring Targeting US Citizens in Financial Fraud

Thứ Sáu, 24 tháng 4, 2026
Some 29 people were charged, including a Cambodian senator, and authorities seized more than 500 Web domains tied to fake investment sites.
0

North Korea's Lazarus Targets macOS Users via ClickFix

Lazarus continues leveraging ClickFix for initial access and data theft, in this case, against Mac-centric organizations and their high-value leaders.
0

Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets

Thứ Năm, 23 tháng 4, 2026
The Chinese state-sponsored cyber threat is known for moving fast and trying odd attack vectors; now it's branching out in tools, victimology, and TTPs.
0

China-Backed Hackers Are Industrializing Botnets

China's state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk, and deniable way.
0

Electricity Is a Growing Area of Cyber Risk

IT has long been concerned about ensuring systems receive the right amount of electricity. Cyberattackers are realizing they can manipulate voltage fluctuations for their purposes, too.
0

Electricity Is a Growing Area of Cyber Risk

IT has long been concerned about ensuring systems receive the right amount of electricity. Cyberattackers are realizing they can manipulate voltage fluctuations for their purposes, too.
0

'Zealot' Shows What AI's Capable of in Staged Cloud Attack

The proof of concept revealed AI-based attacks unfold too fast for human defenders to respond, and that AI evinced more autonomous behavior than expected.
0

'The Gentlemen' Rapidly Rises to Ransomware Prominence

Thứ Tư, 22 tháng 4, 2026
Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up operations — and its sophistication.
0

DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'

A compromised developer's repository serves as a worm-like infection vector to spread remote access Trojans (RATs) and other malware.
0

Ransomware Negotiator Pleads Guilty to BlackCat Scheme

Thứ Ba, 21 tháng 4, 2026
A cautionary tale illustrates why the person negotiating should never be involved with any part of the ransom payment process, experts noted.
0

Exploits Turn Windows Defender into Attacker Tool

Three proof-of-concept exploits are being used in active attacks against Microsoft's built-in security platform; two are unpatched.
0

Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware and compromise supply chains.
0

Google Fixes Critical RCE Flaw in AI-Based Antigravity Tool

The prompt injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that allowed for sandbox escape and arbitrary code execution.
0

Chinese APT Targets Indian Banks, Korean Policy Circles

China is spying on India's financial sector, for some reason, and it's not putting much effort into it, judging by some stale TTPs.
0

Vercel Employee's AI Tool Access Led to Data Breach

Thứ Hai, 20 tháng 4, 2026
Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," a researcher noted.
0

Serial-to-IP Devices Hide Thousands of Old and New Bugs

The OT devices that translate machine talk into Internet-speak are riddled with vulnerabilities and more frequently targeted for attacks, researchers say.
0

WhatsApp Leaks User Metadata to Attackers

Strangers can infer limited info about you without knowing or messaging you, which could theoretically aid certain kinds of malicious activity.
0

Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing

Thứ Sáu, 17 tháng 4, 2026
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.
0

Coast Guard's New Cybersecurity Rules Offers Lessons for CISOs

The Maritime Transportation Security Act (MTSA) requires plans to protect OT systems, audits by independent third parties, and a hybrid OT-security role.
0

NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities

The National Institute of Standards and Technology carved a new path for vulnerability remediation by changing the way it prioritizes software flaws.
0

North Korea Uses ClickFix to Target macOS Users' Data

Thứ Năm, 16 tháng 4, 2026
Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.
0

'Harmless' Global Adware Transforms Into an AV Killer

A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.
0

Microsoft's Original Windows Secure Boot Certificate Is Expiring

The Secure Boot refresh is one of the largest coordinated security maintenance efforts across the Windows ecosystem, Microsoft said. Update those PCs soon.
0

6-Year Ransomware Campaign Targets Turkish Homes & SMBs

Thứ Tư, 15 tháng 4, 2026
While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.
0

Critical MCP Integration Flaw Puts NGINX at Risk

Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration files.
0

Navigating the Unique Security Risks of Asia's Digital Supply Chain

Regulatory differences, interconnected digital ecosystems, and the rise of AI have created a complex supply chain Asian organizations must wrangle.
0

Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads

Thứ Ba, 14 tháng 4, 2026
Security teams can't test distributed denial-of-service defenses in a vacuum. They need to test during periods of high demand, such as tax filing deadlines.
0

EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses

Stopping EDR killers, which employ bring-your-own-vulnerable-driver (BYOVD) attack techniques, is difficult, but not impossible.
0

Wargame Exercise Demonstrates How Social Media Manipulation Works

In an educational game called "Capture the Narrative," students created bots to sway a fictional election, simulating influence in real-world political scenarios.
0

CSA: CISOs Should Prepare for Post-Mythos Exploit Storm

Thứ Hai, 13 tháng 4, 2026
Security experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos in a new paper from the Cloud Security Alliance (CSA).
0

Adobe Patches Actively Exploited Zero-Day That Lingered for Months

An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months.
0

Empty Attestations: OT Lacks the Tools for Cryptographic Readiness

OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.
0

APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials

The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.
0

Hims Breach Exposes the Most Sensitive Kinds of PHI

Thứ Sáu, 10 tháng 4, 2026
Threat actors breached the telehealth brand, and now they may know who's bald, overweight, and impotent. What could they do with that information?
0

Your Next Breach Will Look Like Business as Usual

These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.
0

Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?

Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said.
0

Russia's 'Fancy Bear' APT Continues Its Global Onslaught

Thứ Năm, 9 tháng 4, 2026
Victims don't need to match the cybercrime group's technical sophistication, experts say. But patching and some form of zero trust are now non-negotiable.
0

'BlueHammer' Windows Zero-Day Exploit Signals Microsoft Bug Disclosure Issues

Under the alias 'Chaotic Eclipse,' a researcher released a PoC exploit for a zero-day flaw that allows for system takeover by a local user, citing an undisclosed beef with Microsoft.
0

Do Ceasefires Slow Cyberattacks? History Suggests Not

The cybersecurity community is waiting with bated breath to see if Iranian hackers will honor a ceasefire that doesn't actually name or directly involve them.
0

Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers

Thứ Tư, 8 tháng 4, 2026
Heard of fileless malware? How about malwareless cyber espionage? Russia's APT28 is spying on global organizations by modifying just one DNS setting in vulnerable routers.
0

Threat Actors Get Crafty With Emojis to Escape Detection

When 🤖 means "bot available," 🧰 signifies "toolkit," or 💰💰💰 translates to "big ransom," bad actors can evade filters and keep it all on the down-low.
0

AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties

Discovery used to be the bottleneck for open source bugs, but with automated discovery, remediation's the bottleneck, which bounties don't fund.
0

Niobium Introduces The Fog

0

Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams

0

Grafana Patches AI Bug That Could Have Leaked User Data

Thứ Ba, 7 tháng 4, 2026
By hiding malicious instructions on an attacker-controlled Web page, AI could ingest orders as benign and return sensitive data to the attacker's server.
0

Focusing on the People in Cybersecurity at RSAC 2026 Conference

AI dominated the RSAC 2026 Conference and showed it's still humans in cybersecurity who matter most.
0

AI-Assisted Supply Chain Attack Targets GitHub

Thứ Hai, 6 tháng 4, 2026
PRT-scan is the second in recent months where a threat actor appears to have leveraged AI for automated targeting of a widespread GitHub misconfiguration.
0

Axios Attack Shows Social Complex Engineering Is Industrialized

The attack on the popular NPM package Axios is just one of many targeting maintainers and has shone a light on how threat actors can scale sophisticated social engineering campaigns.
0

Fortinet Issues Emergency Patch for FortiClient Zero-Day

The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild.
0

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

An emerging threat cluster tracked as UAT-10608 is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to exfiltrate credentials, secrets, and other system data.
0

Shadow AI in Healthcare is Here to Stay

Medical professionals are not going to stop using AI tools to manage growing workloads. Organizations should prioritize bolstering security protocols to limit their blast radius.
0

OWASP GenAI Security Project Gets Update, New Tools Matrix

In recognition of 21 generative AI risks, the standards groups recommends that companies take separate but linked approaches to defending GenAI and agentic AI systems.
0

Inconsistent Privacy Labels Don't Tell Users What They Are Getting

Thứ Sáu, 3 tháng 4, 2026
Data privacy labels are a great idea for mobile apps, but the current versions just aren't good enough.
0

Apple Breaks Precedent, Patches DarkSword for iOS 18

Even organizations with users unwilling or unable to adopt iOS 26 can now protect themselves from a severe mobile OS-cracking tool.
0

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

The rebuilt Chainguard platform adds deeper security designed to continuously reconcile open-source artifacts across containers, libraries, Actions and skills.
0

CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

Once CrowdStrike’s nemesis, Microsoft is now a collaborator. A shared interest in Formula 1 helped thaw the years-long fierce rivalry.
0

Security Bosses Are All-In on AI. Here's Why

Thứ Năm, 2 tháng 4, 2026
CISOs are bullish on AI and have big plans to roll out future tools. We talk to Reddit CISO Frederick Lee and leading analyst Dave Gruber about how AI is working out in the real world, as well as its future promise.
0

Bank Trojan 'Casbaneiro' Worms Through Latin America

Augmented Marauder's multipronged banking-Trojan cyber campaigns are targeting Spanish speakers, evading detection, and replicating rapidly.
0

Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense

A chief medical information officer provided a peek into what hospitals face when they inevitably suffer a ransomware attack—whether it leads to short or long-term outages.
0

LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut

Thứ Tư, 1 tháng 4, 2026
A newly released study exclusively shared with Dark Reading details the unique circumstances that make up Latin America's labor pool, and why organizations may want to expand their talent search.
0

Cyberattacks Intensify Pressure on Latin American Governments

Cyber threats across Latin America are increasingly targeting government systems, from disruptive attacks in Puerto Rico to a surge of probes against Colombia’s health sector.
0

Are We Training AI Too Late?

Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.
0

Axios NPM Package Compromised in Precision Attack

Thứ Ba, 31 tháng 3, 2026
The NPM package for Axios, a popular JavaScript HTTP client library, was briefly compromised this week, possibly by North Korean threat actors.
0

TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials

The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly to compromised credentials.
0

AI-Powered 'DeepLoad' Malware Steals Credentials, Evades Detection

Thứ Hai, 30 tháng 3, 2026
The massive amount of junk code that hides the malware's logic from security scans was almost certainly generated by AI, researchers say.
0

Fortinet BIG-IP Vulnerability Reclassified as RCE, Under Exploitation

CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.
0

Manufacturing and Healthcare Share Struggles with Passwords

The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.
0

Storm Brews Over Critical, No-Click Telegram Flaw

The vulnerability, which is allegedly triggered by a corrupted sticker in the messaging app, received a 9.8 CVSS score, but Telegram denies it exists.
0

Coruna, DarkSword & Democratizing Nation-State Exploit Kits

Thứ Sáu, 27 tháng 3, 2026
Nation-state malware is being sold on the Dark Web and leaked to GitHub; and ordinary organizations might not stand much of a chance of defending themselves.
0

Google Sets 2029 Deadline for Quantum-Safe Cryptography

The post-quantum future may be coming sooner than you think, as Google plans to have PQC migration in place by 2029.
0

Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles

Thứ Năm, 26 tháng 3, 2026
More than a decade since the 2015 Jeep hack, the cybersecurity of vehicles remains of the utmost importance.
0

Critical Flaw in Langflow AI Platform Under Attack

Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizations have little time to address critical bugs.
0

AI-Powered Dependency Decisions Introduce, Ignore Security Bugs

AI models often hallucinate or make costly mistakes when tasked with recommending software versions, upgrade paths, and security fixes — leading to significant technical debt.
0

Intermediaries Driving Global Spyware Market Expansion

Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds.
0

At RSAC, the EU Leads While US Officials Are Sidelined

Thứ Tư, 25 tháng 3, 2026
While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today's top cybersecurity challenges.
0

Blame Game: Why Public Cyber Attribution Carries Risks

Publicly accusing an entity of a cyberattack could have negative consequences that organizations should consider before taking the plunge.
0

CSA Launches CSAI Foundation for AI Security

Cloud Security Alliance creates dedicated nonprofit to govern autonomous AI agent ecosystems through risk intelligence and certification
0

Iran Hacktivists Make Noise but Have Little Impact on War

Thứ Ba, 24 tháng 3, 2026
Iran-aligned groups are trying to make their mark in the Gulf, but the results have fallen short of remarkable.
0

How AI Coding Tools Crushed the Endpoint Security Fortress

Security vendors have spent years building up defenses around the endpoint, but one researcher says AI coding tools have brought the walls down.
0

Ransomware's New Era: Moving at AI Speed

Thứ Hai, 23 tháng 3, 2026
Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data
0

CISOs Debate Human Role in AI-Powered Security

The idea of a "human in the loop" in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week.
0

Attackers Hide Infostealer in Copyright Infringement Notices

A phishing campaign targeting healthcare, government, hospitality, and education sectors in various countries uses several evasion techniques to avoid detection.
0

AI Dominates RSAC Innovation Sandbox

The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.
0

Patch Now: Oracle's Fusion Middleware Has Critical RCE Flaw

Thứ Sáu, 20 tháng 3, 2026
Attackers can execute arbitrary code without authentication if Oracle's Identity or Web Services Managers are exposed to the Web.
0

Cyber OpSec Fail: Beast Gang Exposes Ransomware Server

Files on a central cloud server used by the ransomware group highlight a systematic, aggressive attack on network backups as a key TTP.
0

With Government's Role Uncertain, Businesses Unite to Combat Fraud

Major industry leaders agree to share information and collaborate to boost defenses in the wake of distressing online scams.
0

Native Launches With Security Control Plane for Multicloud

The cloud security startup's platform translates and enforces security policies across AWS, Azure, Google Cloud and Oracle using provider-native controls.
0

Post-Quantum Web Could be Safer, Faster

Major providers are testing a quantum-safe version of HTTPS that shrinks certificates to a tenth their previous size, decreasing latency and adding transparency.
0

AI Conundrum: Why MCP Security Can't Be Patched Away

Thứ Năm, 19 tháng 3, 2026
MCP introduces security risks into LLM environments that are architectural and not easily fixable, researcher says at RSAC 2026 Conference.
0

EU Sanctions Companies in China, Iran for Cyberattacks

Already sanctioned in the US and the UK, these rulings prohibit companies and a couple of principals from entering or doing business in the European Union.
0

C2 Implant 'SnappyClient' Targets Crypto Wallets

Thứ Tư, 18 tháng 3, 2026
In addition to enabling remote access, the malware supports a wide range of capabilities including data theft and spying.
0

Clear Communication: The Missing Link in Cybersecurity Success

When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups.
0

Meta, TikTok Steal Users' Sensitive PII When They Click on Ads

Tracking pixels let social media companies spy on their own customers when they click over to advertiser sites, gleaning credit card info, currency type, and more.
0

Less Lucrative Ransomware Market Makes Attackers Alter Methods

Thứ Ba, 17 tháng 3, 2026
Ransomware actors are ditching Cobalt Strike in favor of native Windows tools, as payment rates hit record lows and data theft surges.
0

Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish

The cyberattackers leveraged trusted brands and domains in an attempt to redirect a C-suite executive at Outpost24 to give up his credentials.
0

Warlock Ransomware Group Augments Post-Exploitation Activities

In a recent attack, the group showcased stealthier cross-network activity, thanks to its use of a new BYOVD technique and other tools.
0

China-Nexus Hackers Skulk in Southeast Asian Military Orgs for Years

Thứ Hai, 16 tháng 3, 2026
Researchers uncovered an extensive cyberespionage campaign that used novel backdoors and familiar evasion techniques to maintain persistent access to regional targets.
0

Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026

Discover how Franz Regul, former CISO for the Paris 2024 Olympics, tackled unique cybersecurity challenges to protect the Olympics from evolving threats.
0

Attackers Abuse LiveChat to Phish Credit Card, Personal Data

A social engineering campaign impersonating PayPal and Amazon uses customer support interactions to acquire sensitive info.
0

A Guy Who Wrote the Code Died in 2005. I Still Have to Secure It

Thứ Sáu, 13 tháng 3, 2026
The real frontline of American cybersecurity is a bidding war on eBay for 30-year-old industrial controllers.
0

Cyberattackers Don't Care About Good Causes

Sightline Security's founder and advisory board discuss how cybersecurity poses significant problems for nonprofits and suggest ways the industry can help.
0

Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos

The excitement around Cisco's latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked risks.
0

Delinea's StrongDM Acquisition Highlights the Changing Role of PAM

Thứ Năm, 12 tháng 3, 2026
StrongDM, which injects ephemeral, real-time credentials into developer workflows, will enable Delinea to offer privilege access management across cloud, SaaS, Kubernetes, and database environments.
0

Commercial Spyware Opponents Fear US Policy Shifting

Rescinded sanctions and reactivated contracts have created confusion about the Trump administration's spyware policy and where it draws the line.
0

Why Stryker's Outage Is a Disaster Recovery Wake-Up Call

The Iranian cyberattack on Stryker is the kind of stress test that business continuity and disaster recovery programs often do not plan for.
0

INC Ransomware Group Holds Healthcare Hostage in Oceania

Thứ Tư, 11 tháng 3, 2026
Government agencies, emergency clinics, and others in Australia, New Zealand, and Tonga have had serious run-ins with the prolific ransomware outfit.
0

Xygeni GitHub Action Compromised Via Tag Poison

Attackers operated an active C2 implant for up to a week and compromised AppSec vendor Xygeni's xygeni/xygeni-action in that time.
0

Middle East Conflict Highlights Cloud Resilience Gaps

Thứ Ba, 10 tháng 3, 2026
Data centers — used by both governments and militaries for operations — are now fair game, not just for cyberattacks, but for kinetic attacks as well.
0

Microsoft Patches 83 CVEs in March Update

For a change, there's little in this month's Patch Tuesday that should cause panic, according to security experts.
0

'Overly Permissive' Salesforce Cloud Configs in the Crosshairs

Some customers have mishandled guest user configurations otherwise intended to allow third-party access to important — and sensitive — client data.
0

Russian Threat Actor Sednit Resurfaces With Sophisticated Toolkit

After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools.
0

'BlackSanta' EDR Killer Targets HR Workflows

A campaign by Russian-speaking cyberattackers hijacks workflows to deliver security-busting malware, allowing attackers to steal data without detection.
0

'InstallFix' Attacks Spread Fake Claude Code Sites

Thứ Hai, 9 tháng 3, 2026
A fresh cyberattack campaign blends malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces.
0

Are We Ready for Auto Remediation With Agentic AI?

With the rapid innovations in AI, we are entering an exciting era of automated risk remediation. Learn about security team readiness to leverage agentic AI for threat and exposure management.
0

Fig Security Emerges From Stealth to Fix Broken Security Operations

Thứ Bảy, 7 tháng 3, 2026
Fig Security's platform traces security data flows end-to-end across SIEMs, pipelines, and response systems to alert teams before infrastructure changes break critical defenses.
0

North Korean APTs Use AI to Enhance IT Worker Scams

Thứ Sáu, 6 tháng 3, 2026
DPRK worker scams are old hat, but they're still working, thanks to AI tools that help with everything from face swapping to daily emails.
0

Nation-State Actor Embraces AI Malware Assembly Line

Thứ Năm, 5 tháng 3, 2026
Pakistan's APT36 threat group has begun using vibe-coding to churn out mediocre malware, but at a scale that could overwhelm defenses.
0

Tycoon 2FA Goes Boom as Europol, Vendors Bust Phishing Platform

The phishing-as-a-service platform was popular among cyber threat actors because of its ability to bypass multifactor authentication defenses.
0

Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

Edge bugs are so fetch, and Cisco just dropped 50 new ones, including some heavy hitters with 10 out of 10 scores on the CVSS scale.
0

Software Development Practices Help Enterprises Tackle Real-Life Risks

Organizations can borrow secure-by-design processes to manage non-technical challenges like governance or the inevitable human error.
0

LatAm Now Faces 2x More Cyberattacks Than US

Much of Central and South America struggles with cybersecurity maturity, and hackers are taking advantage.
0

VMware Aria Operations Bug Exploited, Cloud Resources at Risk

Thứ Tư, 4 tháng 3, 2026
Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.
0

Stranger Things Meets Cybersecurity: Lessons from the Hive Mind

Events and concepts from the Stranger Things television series illustrate how enterprises can defend their networks and stay "right side up."
0

Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate

Thứ Ba, 3 tháng 3, 2026
Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here's his story.
0

Vehicle Tire Pressure Sensors Enable Silent Tracking

Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors.
0

Qualcomm Zero-Day Exploited in Targeted Android Attacks

The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.
0

Speakeasies to Shadow AI: Banning AI Browsers Will Fail

Lessons from history highlight why AI-enabled browsers require controlled enablement.
0

As War Continues, Pro-Iranian Actors Launch Barrage of Cyberattacks

Iran and its supporters have taken to cyberspace to retaliate for US-Israeli military action, with an aim to cause economic and physical disruption.
0

The Tug-of-War Over Firewall Backlogs in the AI-Driven Development Era

Thứ Hai, 2 tháng 3, 2026
Speed and security are historically clashing priorities, but with AI and automation, it's increasingly important that application developers and security teams get on the same page.
0

Critical OpenClaw Vulnerability Exposes AI Agent Risks

The now-patched flaw is the latest in a growing string of security issues associated with the viral AI tool, which has seen rapid adoption among developers.
0

30 Alleged Members of 'The Com' Arrested in Project Compass

The global law enforcement crackdown, which began in January 2025, also identified nearly 180 members of the notorious cybercriminal collective.
0

Bug in Google's Gemini AI Panel Opens Door to Hijacking

Attackers could have exploited the vulnerability to escalate privileges, violate user privacy while browsing, and access sensitive resources.
0

Flaw-Finding AI Assistants Face Criticism for Speed, Accuracy

Chủ Nhật, 1 tháng 3, 2026
Using AI to find security vulnerabilities holds significant promise, but the initial products fall short of the needs of enterprises and software developers, say experts.
0

Cities Hosting Major Events Need More Focus on Wireless, Drone Defense

Thứ Sáu, 27 tháng 2, 2026
Major events like the FIFA World Cup need to look beyond traditional physical and cyber security to active and passive wireless threats, say experts.
0

Cities Hosting Major Events Need More Focus on Wireless, Drone Defense

Major events like the FIFA World Cup need to look beyond traditional physical and cyber security to active and passive wireless threats, say experts.
0

The Case for Why Better Breach Transparency Matters

It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse — not disclose the incident at all.
0

Claude Code Security Shows Promise, Not Perfection

Claude Code's introduction rippled across the stock market, but researchers and analysts say its impact was overstated, as they peel back the layers.
0

Cisco SD-WAN Zero-Day Under Exploitation for 3 Years

Thứ Năm, 26 tháng 2, 2026
The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.
0

PCI Council Says Threats to Payments Systems Are Speeding Up

Thứ Tư, 25 tháng 2, 2026
The PCI Security Standards Council experienced a record year in many regards, but its first annual report shows it needs to work even faster to stay ahead of attackers.
0

Malicious Next.js Repos Target Developers Via Fake Job Interviews

Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent access to infected machines.
0

'Richter Scale' Model Measures Magnitude of OT Cyber Incidents

ICS/OT experts have devised a scoring system for rating the severity and effects of cybersecurity events in operational technology environments.
0

Operation Red Card 2.0 Leads to 651 Arrests in Africa

In the latest operation targeting cybercrime groups, African law enforcement agencies cooperated with Interpol and cybersecurity firms to recover more than USD 4.3 million.
0

Attackers Now Need Just 29 Minutes to Own a Network

Thứ Ba, 24 tháng 2, 2026
Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.
0

Lazarus Group Picks a New Poison: Medusa Ransomware

The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.
0

Spitting Cash: ATM Jackpotting Attacks Surged in 2025

Thứ Hai, 23 tháng 2, 2026
The attacks cost banks more than $20 million in losses last year, as criminals used many of the same tools and tactics they have wielded for more than a decade.
0

600+ FortiGate Devices Hacked by AI-Armed Amateur

A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.
0

Enigma Cipher Device Still Holds Secrets for Cyber Pros

The Nazi relic's history is riddled with resilience errors, and those lessons still apply to defending against modern cyber threats.
0

Attackers Use New Tool to Scan for React2Shell Exposure

Thứ Sáu, 20 tháng 2, 2026
Researchers say threat actors wielded the sophisticated — and unfortunately named — toolkit to target high-value networks for React2Shell exploitation.
0

Lessons From AI Hacking: Every Model, Every Layer Is Risky

After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities.
0

Supply Chain Attack Secretly Installs OpenClaw for Cline Users

Thứ Năm, 19 tháng 2, 2026
The malicious version of Cline's npm package — 2.3.0 — was downloaded more than 4,000 times before it was removed.
0

Best-in-Class 'Starkiller' Phishing Kit Bypasses MFA

A user-friendly PhaaS tool beats standard methods for detecting phishing attacks by live-proxying legitimate login sites.
0

Abu Dhabi Finance Week Exposed VIP Passport Details

Unprotected cloud data sends the wrong signal at a time when the emirate's trying to attract investors and establish itself as a global financial center.
0

Connected and Compromised: When IoT Devices Turn Into Threats

Reused passwords, a lack of network segmentation, and poor sanitization processes make the Internet of Things' attack surfaces more dangerous.
0

Scam Abuses Gemini Chatbots to Convince People to Buy Fake Crypto

Thứ Tư, 18 tháng 2, 2026
A convincing presale site for phony "Google Coin" features an AI assistant that engages victims with a slick sales pitch, funneling payment to attackers.
0

Dell's Hard-Coded Flaw: A Nation-State Goldmine

A China-related attacker has exploited the vendor flaw since mid-2024, allowing it to move laterally, maintain persistent access, and deploy malware.
0

A CISO's Playbook for Defending Data Assets Against AI Scraping

Discover a strategic approach to govern scraping risks, balance security with business growth, and safeguard intellectual capital from automated data harvesting.
0

Poland Energy Survives Attack on Wind, Solar Infrastructure

Thứ Ba, 17 tháng 2, 2026
Russia-aligned groups are probable culprits behind the wiper attacks against renewable energy farms, a manufacturer, and a heating and power plant.
0

RMM Abuse Explodes as Hackers Ditch Malware

It's the path of lesser resistance, as remote monitoring and management (RMM) software offers stealth, persistence, and operational efficiency.
0

ClickFix Attacks Abuses DNS Lookup Command to Deliver ModeloRAT

ClickFix campaigns have adapted to the latest defenses with a new technique to trick users into infecting their own machines with malware.
0

Operation DoppelBrand: Weaponizing Fortune 500 Brands

Thứ Hai, 16 tháng 2, 2026
The GS7 cyberthreat group targets US financial institutions with near-perfect imitations of corporate portals to steal credentials and gain remote access.
0

260K+ Chrome Users Duped by Fake AI Browser Extensions

30 copycat apps tricked users, and Google itself, into thinking they're legitimate AI tools.
0

Zscaler-SquareX Deal Boosts Zero Trust, Secure Browsing Capabilities

Thứ Bảy, 14 tháng 2, 2026
Zscaler's acquisition of SquareX comes as competitors like CrowdStrike and Palo Alto Networks are also investing in secure browser technologies.
0

AI Agents 'Swarm,' Security Complexity Follows Suit

Thứ Sáu, 13 tháng 2, 2026
As AI deployments scale and start to include packs of agents autonomously working in concert, organizations face a naturally amplified attack surface.
0

Those 'Summarize With AI' Buttons May Lying to You

Thứ Năm, 12 tháng 2, 2026
Microsoft uncovered AI recommendation poisoning in 31 companies across 14 industries, and turnkey tools make it trivially easy to pull off.
0

Senegalese Data Breaches Expose Lack of 'Security Maturity'

Green Blood Group steals personal records and biometric data of the West African nation's nearly 20 million residents.
0

North Korea's UNC1069 Hammers Crypto Firms With AI

Thứ Tư, 11 tháng 2, 2026
In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix.
0

Automaker Secures the Supply Chain With Developer-Friendly Platform

How a platform engineering team embeds supply chain security into infrastructure without slowing developers.
0

How to Stay on Top of Future Threats With a Cutting-Edge SOC

CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security.
0

Asia Fumbles With Throttling Back Telnet Traffic in Region

Thứ Ba, 10 tháng 2, 2026
Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall the region lagged in curbing Telnet traffic.
0

In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware'

With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or targeted social engineering.
0

Microsoft Patches 6 Actively Exploited Zero-Days

Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in multiple Microsoft products.
0

Warlock Gang Breaches SmarterTools Via SmarterMail Bugs

Thứ Hai, 9 tháng 2, 2026
The ransomware group breached SmarterTools through a vulnerability in the company's own SmarterMail product.
0

[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses

0

Black Basta Bundles BYOVD With Ransomware Payload

Researchers discovered a newly disclosed vulnerable driver embedded in Black Basta's ransomware, illustrating the increasing popularity of the defense-evasion technique.
0

"Encrypt It Already" Campaign Pushes Big Tech to Prioritize E2E Encryption

Thứ Sáu, 6 tháng 2, 2026
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption by default across their services, as privacy concerns mount amid increased AI use.
0

OpenClaw's Gregarious Insecurities Make Safe Usage Difficult

Malicious "skills" and persnickety configuration settings are just some of the issues that security researchers have found when installing — and removing — the OpenClaw AI assistant.
0

Data Tool to Triage Exploited Vulnerabilities Can Make KEV More Useful

A disconnect exists between the organization's cybersecurity needs and lists like CISA's KEV Catalog. KEV Collider combines data from multiple open source vulnerability frameworks to help security teams quickly assess which are important, based on their priorities.
0

EnCase Driver Weaponized as EDR Killers Persist

Thứ Năm, 5 tháng 2, 2026
The forensic tool's driver was signed with a digital certificate that expired years ago, but major security gaps allowed Windows to load it.
0

Agentic AI Site 'Moltbook' Is Riddled With Security Risks

Someone used AI to build an entire Web platform, which then did something predictable and preventable: It exposed all its data through a publicly accessible API.
0

Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis

Thứ Tư, 4 tháng 2, 2026
Iranian threat actors have been stealing credentials from people of interest across the Middle East, using spear-phishing and social engineering.
0

CISA Makes Unpublicized Ransomware Updates to KEV Catalog

A third of the "flipped" CVEs affected network edge devices, leading one researcher to conclude, "Ransomware operators are building playbooks around your perimeter."
0

Attackers Use Windows Screensavers to Drop Malware, RMM Tools

By tapping the unusual .scr file type, attackers leverage "executables that don't always receive executable-level controls," one researcher noted.
0

Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days

Thứ Ba, 3 tháng 2, 2026
APT28's attacks rely on specially crafted Microsoft Rich Text Format (RTF) documents to kick off a multistage infection chain to deliver malicious payloads.
0

GlassWorm Malware Returns to Shatter Developer Ecosystems

The self-replicating malware has poisoned a fresh set of Open VSX software components, leaving potential downstream victims with infostealer infections.
0

8-Minute Access: AI Accelerates Breach of AWS Environment

The AI-assisted attack, which started with exposed credentials from public S3 buckets, rapidly achieved administrative privilges.
0

Dark Patterns Undermine Security One Click at a Time

People trust organizations to do the right thing, but websites’ and apps’ dark patterns pose a hidden threat that can lead to inadequate security behaviors.
0

County Pays $600K to Wrongfully Jailed Pen Testers

Thứ Hai, 2 tháng 2, 2026
Iowa police arrested two penetration testers in 2019 for doing their jobs, highlighting the risk to security professionals in red teaming exercises.
0

Chinese Hackers Hijack Notepad++ Updates for 6 Months

State-sponsored threat actors compromised the popular code editor's hosting provider to redirect targeted users to malicious downloads.
0

ShinyHunters Expands Scope of SaaS Extortion Attacks

Following its attacks on Salesforce instances last year, members of the cybercrime group have broadened their targeting and gotten more aggressive with extortion tactics.
0

Torq Moves SOCs Beyond SOAR With AI-Powered Hyper Automation

Thứ Bảy, 31 tháng 1, 2026
Investors poured $140 million into Torq's Series D Round, bringing the startup's valuation to $1.2 billion, to bring AI-based "hyper automation" to SOCs.
0

Out-of-the-Box Expectations for 2026 Reveal a Grab-Bag of Risk

Thứ Sáu, 30 tháng 1, 2026
Security teams need to be thinking about this list of emerging cybersecurity realities, to avoid rolling the dice on enterprise security risks (and opportunities).
0

Tenable Tackles AI Governance, Shadow AI Risks, Data Exposure

The Tenable One AI Exposure add-on discovers unsanctioned AI use in the organization and enforces policy compliance with approved tools.
0

OpenClaw AI Runs Wild in Business Environments

The popular open source AI assistant (aka ClawdBot, MoltBot) has taken off, raising security concerns over its privileged, autonomous control within users' computers.
0

From Quantum to AI Risks: Preparing for Cybersecurity's Future

Thứ Năm, 29 tháng 1, 2026
As 2026 begins, these journalists urge the cybersecurity industry to prioritize patching vulnerabilities, preparing for quantum threats, and refining AI applications, in the latest edition of Reporters' Notebook.
0

More Critical Flaws on n8n Could Compromise Customer Security

A new around of vulnerabilities in the popular AI automation platform could let attackers hijack servers and steal credentials.
0

'Semantic Chaining' Jailbreak Dupes Gemini Nano Banana, Grok 4

If an attacker splits a malicious prompt into discrete chunks, some large language models (LLMs) will get lost in the details and miss the true intent.
0

Months After Patch, WinRAR Bug Poised to Hit SMBs Hardest

Thứ Tư, 28 tháng 1, 2026
Russian and Chinese nation-state attackers are exploiting a months-old WinRAR vulnerability, despite a patch that came out last July.
0

Consumers Reluctant to Shop at Stores That Don't Take Security Seriously

The retail sector must adapt as consumers become more cybersecurity-conscious. Increased attack transparency is a good place to start.
0

Fortinet Confirms New Zero-Day Behind Malicious SSO Logins

To stop the ongoing attacks, the cybersecurity vendor took the drastic step of temporarily disabling FortiCloud single sign-on (SSO) authentication for all devices.
0

China-Backed 'PeckBirdy' Takes Flight for Cross-Platform Attacks

In two separate campaigns, attackers used the JScript C2 framework to target Chinese gambling websites and Asian government entities with new backdoors.
0

Critical Telnet Server Flaw Exposes Forgotten Attack Surface

Thứ Ba, 27 tháng 1, 2026
While telnet is considered obsolete, the network protocol is still used by hundreds of thousands of legacy systems and IoT devices for remote access.
0

'Stanley' Toolkit Turns Chrome Into Undetectable Phishing Vector

The malware-as-a-service kit enables malicious extensions to overlay pages on real websites without changing the visible URL, signaling a fresh challenge for enterprise security.
0

Hand CVE Over to the Private Sector

How MITRE has mismanaged the world's vulnerability database for decades and wasted millions along the way.
0

Sandworm Blamed for Wiper Attack on Poland Power Grid

Thứ Hai, 26 tháng 1, 2026
Researchers attributed the failed attempt to the infamous Russian APT Sandworm, which is notorious for wiper attacks on critical infrastructure organizations.
0

Dark Reading Confidential: Reviving the Hacker Ethos That Built Cybersecurity

Dark Reading Confidential Episode 14: How curious, ethical problem-solving can continue to serve as a guiding principle for an evolving cybersecurity sector.
0

DPRK's Konni Targets Blockchain Developers With AI-Generated Backdoor

The North Korean threat group is using a new PowerShell backdoor to compromise development environments and target cryptocurrency holdings, according to researchers.
0

2025 Was a Wake-Up Call to Protect Human Decisions, Not Just Systems

Thứ Bảy, 24 tháng 1, 2026
Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures.
0

Europe's GCVE Raises Concerns Over Fragmentation in Vulnerability Databases

GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders.
0

Exploited Zero-Day Flaw in Cisco UC Could Affect Millions

Thứ Sáu, 23 tháng 1, 2026
Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover.
0

Dark Reading Confidential: Reviving the Hacker Ethos That Built Cybersecurity

Dark Reading Confidential Episode 14: How curious, ethical problem solving can continue to serve as a guiding principle for an evolving cybersecurity sector.
0

Healthy Security Cultures Thrive on Risk Reporting

The signs of an effective security culture are shifting as companies call on CISOs and security teams to raise their hands unabashedly.
0

Risky Chinese Electric Buses Spark Aussie Gov't Review

Thứ Năm, 22 tháng 1, 2026
Deployed across Australia and Europe, China's electric buses are vulnerable to cybercriminals and sport a virtual kill switch the Chinese state could activate.
0

Fortinet Firewalls Hit With Malicious Configuration Changes

Automated infections of potentially fully patched FortiGate devices are allowing threat actors to steal firewall configuration files.
0

From a Whisper to a Scream: Europe Frets About Overreliance on US Tech

Concern is growing across Europe about relying on US cybersecurity companies, and Greenland takeover talk is eroding trust across the EU even further.
0

DPRK Actors Deploy VS Code Tunnels for Remote Hacking

A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to avoid detection.
0

AI Agents Undermine Progress in Browser Security

Web browser companies have put in substantial effort over the last three decades to strengthen the browser security stack to withstand abuses. Agentic browsers are undoing all that work.
0

'Contagious Interview' Attack Now Delivers Backdoor Via VS Code

Thứ Tư, 21 tháng 1, 2026
Once trust is granted to the repository's author, a malicious app executes arbitrary commands on the victim's system with no other user interaction.
0

Phishing Campaign Zeroes in on LastPass Customers

The bait incudes plausible subject lines and credible messages, most likely thanks to attackers' use of large language models to craft them.
0

'Damn Vulnerable' Training Apps Leave Vendors' Clouds Exposed

Hackers are already leveraging these over-permissioned programs to access the IT systems of major security vendors.
0

'CrashFix' Scam Crashes Browsers, Delivers Malware

Thứ Ba, 20 tháng 1, 2026
The attack consists of a NexShield malicious browser extension, a social engineering technique to crash the browser, and a Python-based RAT.
0

Mass Spam Attacks Leverage Zendesk Instances

The CRM vendor advised ignoring or deleting suspicious emails and said the attacks were not tied to any breach or software vulnerability.
0

Vulnerabilities Threaten to Break Chainlit AI Framework

Familiar bugs in a popular open source framework for AI chatbots could give attackers dangerous powers in the cloud.
0

Microsoft & Anthropic MCP Servers At Risk of RCE, Cloud Takeovers

Researchers found the popular model context protocol (MCP) servers, which are integral components of AI services, carry serious vulnerabilities.
0

ChatGPT Health Raises Big Security, Safety Concerns

Thứ Hai, 19 tháng 1, 2026
ChatGPT Health promises robust data protection, but elements of the rollout raise big questions regarding user security and safety.
0

More Problems for Fortinet: Critical FortiSIEM Flaw Exploited

Thứ Sáu, 16 tháng 1, 2026
CVE-2025-64155, a command injection vulnerability, was disclosed earlier this week and quickly came under attack from a variety of IP addresses.
0

CISOs Rise to Prominence: Security Leaders Join the Executive Suite

Security professionals are moving on up the executive ranks as enterprises face rising regulatory and compliance standards.
0

AI System Reduces Attack Reconstruction Time From Weeks to Hours

Pacific Northwest National Labs' expert cybersecurity system, ALOHA, can recreate attacks and test them against organizations' infrastructure to bolster defense.
0

Winter Olympics Could Share Podium With Cyberattackers

Thứ Năm, 15 tháng 1, 2026
The upcoming Winter Games in the Italian Alps are attracting both hacktivists looking to reach billions of people and state-sponsored cyber-spies targeting the attending glitterati.
0

Microsoft Disrupts Cybercrime Service RedVDS

Thứ Tư, 14 tháng 1, 2026
RedVDS, a cybercrime-as-a-service operation that has stolen millions from victims, lost two domains to a law enforcement operation supported by Microsoft.
0

Retail, Services Industries Under Fire in Oceania

Last year in Australia, New Zealand, and the South Pacific, Main Street businesses like retail and construction suffered more cyberattacks than their critical sector counterparts.
0

Secure Your Spot at RSAC 2026 Conference

0

'VoidLink' Malware Poses Advanced Threat to Linux Systems

Researchers discovered a modular, "cloud-first" framework that is feature-rich and designed to maintain stealthy, long-term access to Linux environments.
0

CISO Succession Crisis Highlights How Turnover Amplifies Security Risks

Thứ Ba, 13 tháng 1, 2026
When cybersecurity leadership turns over too fast, risk does not reset. It compounds.
0

'Most Severe AI Vulnerability to Date' Hits ServiceNow

ServiceNow tacked agentic AI onto a largely unguarded legacy chatbot, exposing customers' data and connected systems.
0

Microsoft Starts 2026 With a Bang: A Freshly Exploited Zero-Day

The vendor's first Patch Tuesday of the year also contains fixes for 112 CVEs, nearly double the amount from last month.
0

Shadow#Reactor Uses Text Files to Deliver Remcos RAT

Attackers use a sophisticated delivery mechanism of text-only files for RAT deployment, showcasing a clever way to bypass defensive tools and rely on the target's own utilities.
0

GoBruteforcer Botnet Targets 50K-plus Linux Servers

Thứ Hai, 12 tháng 1, 2026
Researchers detailed a souped-up version of the GoBruteforcer botnet that preys on servers with weak credentials and AI-generated configurations.
0

FBI Flags Quishing Attacks From North Korean APT

A state-sponsored threat group tracked as "Kimsuky" sent QR-code-filled phishing emails to US and foreign government agencies, NGOs, and academic institutions.
0

Hexnode Moves into Endpoint Security With Hexnode XDR

0

Two Separate Campaigns Target Exposed LLM Services

A total of 91,403 sessions targeted public LLM endpoints to find leaks in organizations' use of AI and map an expanding attack surface.
0

Deepfake Fraud Tools Are Lagging Behind Expectations

Thứ Sáu, 9 tháng 1, 2026
Deepfakes are becoming more realistic and more popular. Luckily, defenders are still ahead in the arms race.
0

Illicit Crypto Economy Surges as Nation-States Join in the Fray

Cybercriminal cryptocurrency transactions totaled billions in 2025, with activity from sanctioned countries like Russia and Iran causing the largest jump.
0

Maximum Severity HPE OneView Flaw Exploited in the Wild

Thứ Năm, 8 tháng 1, 2026
Exploitation of CVE-2025-37164 can enable remote code execution on HPE's IT infrastructure management platform, leading to devastating consequences.
0

Fake AI Chrome Extensions Steal 900K Users' Data

Threat actors ripped off a legitimate AI-powered Chrome extension in order to harvest ChatGPT and DeepSeek data before sending it to a C2 server.
0

ChatGPT's Memory Feature Supercharges Prompt Injection

The "ZombieAgent" exploit makes use of ChatGPT's long-term memory and advanced capabilities.
0

Here's What Cloud Security's Future Holds for the Year Ahead

Here are the top cloud security trends I'm seeing in my crystal ball for the New Year — particularly arming us for AI adoption.
0

Phishers Exploit Office 365 Users Who Let Their Guard Down

Thứ Tư, 7 tháng 1, 2026
Microsoft said that Office 365 tenants with weak configurations and who don't have strict anti-spoofing protection enabled are especially vulnerable.
0

Lack of MFA is Common Thread in Vast Cloud Credential Heist

An emerging threat actor that goes by "Zestix" used an assortment of infostealers to obtain credentials and breach file-sharing instances of approximately 50 enterprises.
0

Cyberattacks Likely Part of Military Operation in Venezuela

Cyber's role in the US raid on Venezuela remains a question, though President Trump alluded to "certain expertise" in shutting down the power grid in Caracas.
0

Scattered Lapsus$ Hunters Snared in Cyber Researcher Honeypot

Thứ Ba, 6 tháng 1, 2026
Scattered Lapsus$ Hunters, also known as ShinyHunters, were drawn in using a realistic, yet mostly fake, dataset.
0

Startup Trends Shaking Up Browsers, SOC Automation, AppSec

In 2025, these startups have reimagined browser security, pioneered application security for AI-generated code, and are building consensus on agentic vs. human costs.
0

Critical 'MongoBleed' Bug Under Active Attack, Patch Now

Thứ Hai, 5 tháng 1, 2026
A memory leak security vulnerability allows unauthenticated attackers to extract passwords and tokens from MongoDB servers.
0

US Cyber Pros Plead Guilty Over BlackCat Ransomware Activity

Two US citizens pleaded guilty to working as ALPHV/BlackCat ransomware affiliates in 2023, and both were previously employed by prominent security firms.
0

When the Cloud Rains on Everyone's IoT Parade

What happens to all of those always-connected devices when the cloud goes down? Disruptions to sleep, school, and smart homes, just to name a few issues.
0

RondoDox Botnet Expands Scope With React2Shell Exploitation

Recent attacks are targeting Next.js servers and pose a significant threat of cryptomining, botnet payloads, and other malicious activity to IoT networks and enterprises.
0

CTO New Year Resolutions for a More Secure 2026

Thứ Sáu, 2 tháng 1, 2026
From securing MCPs and supply chain defenses to formal AI and quantum governance, experts share their wish lists for cyber safety in 2026.