Dark Reading

Fake DeepSeek Ads Spread Malware to Google Users

Popularity of the generative AI platform makes it an obvious choice for cybercri...

Security Expert Troy Hunt Lured in by Mailchimp Phish

Hunt quickly took to his blog to notify the public of the breach and provide fur...

High-Severity Cloud Security Alerts Tripled in 2024

Attackers aren't just spending more time targeting the cloud — they're ruthlessl...

Cybersecurity Gaps Leave Doors Wide Open

Attackers don't always need to resort to sophisticated gambits to break and ente...

Beyond STIX: Next-Level Cyber-Threat Intelligence

While industry experts continue to analyze, interpret, and act on threat data, t...

Google Hastily Patches Chrome Zero-Day Exploited by APT

Researchers at Kaspersky discovered cyber-espionage activity that used the vulne...

'Lucid' Phishing-as-a-Service Exploits Faults in iMessa...

Cybercriminals in China have figured out how to undermine the strengths of mobil...

New Testing Framework Helps Evaluate Sandboxes

The Anti-Malware Testing Standards Organization published a Sandbox Evaluation F...

Security Tech That Can Make a Difference During an Attack

The recent report of how Volt Typhoon compromised systems at a water utility hig...

Public-Private Ops Net Big Wins Against African Cybercrime

Three cybersecurity firms worked with Interpol and authorities in Nigeria, South...

OPSEC Nightmare: Leaking US Military Plans to a Reporter

Experts say the leakage of US military plans to a reporter this month reflects a...

South African Poultry Company Reports $1M Loss After Cy...

The company reports that no sensitive information was breached or stolen in the ...

Accused Snowflake Attacker 'Judische' Agrees to US Extr...

Though there is no confirmation as to when this extradition will occur, Alexande...

5 Considerations for a Data Loss Prevention Rollout

Strong DLP can be a game-changer — but it can also become a slow-moving, overcom...

23andMe Bankruptcy Filing May Put Sensitive Data at Risk

Security experts worry the company's Chapter 11 status and aim to sell its asset...

Windows 10 End-of-Life Puts SMB at Risk

Upgrading the organization's Windows 10 systems to Windows 11 could potentially ...

Meet the Low-Key Access Broker Supercharging Russian St...

Raspberry Robin breaks into organizations and sells access to Russian threat act...

Microsoft Gives Security Copilot Some Autonomy

New agentic AI capabilities in Microsoft Security Copilot will allow agents to t...

Chinese Hacker Group Tracked Back to iSoon APT Operation

The group, called FishMonger or Aquatic Panda, is working under contract for the...

FBI Warns of Document Converter Tools Due to Uptick in ...

The FBI's Denver field office says the tools will convert documents while also d...

Critical 'IngressNightmare' Vulns Imperil Kubernetes En...

More than 40% of all Internet-facing container orchestration clusters are at risk.

China-Nexus APT 'Weaver Ant' Caught in Yearslong Web Sh...

The persistent threat actor was caught using sophisticated Web shell techniques ...

US Weakens Disinformation Defenses, as Russia & Chi...

Russia and China spend billions of dollars on state media, propaganda, and disin...

FCC Investigates China-Backed Tech Suppliers for Evadin...

FCC chairman warns these companies may still be operating in the US because they...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.