
Dark Reading
@DarkReading
Followers
342K
Following
1K
Media
926
Statuses
36K
One of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.
Joined November 2008
In the latest episode of our "Heard it from a CISO" series, Kristina Beek, associate editor at Dark Reading, chats with Jessica Sica, CISO at Weave Communications, about her thoughts on how entering the cybersecurity industry is changing for newcomers and what industry is most
3
2
13
Silk Typhoon Attacks North American Orgs in the Cloud: by Nate Nelson.
darkreading.com
A Chinese APT is going where most APTs don't: deep into the cloud, compromising supply chains and deploying uncommon malware.
0
1
2
The Growing Challenge of AI Agent and NHI Management: by Michael Morgenstern, partner, DayBlink Consulting.
darkreading.com
A growing ecosystem of agents, chatbots & machine credentials that outnumber human users creates a poorly understood, potentially big security issue.
1
1
3
Apple Patches Zero-Day Flaw Used in 'Sophisticated' Attack: by Rob Wright.
darkreading.com
CVE-2025-43300 is the latest zero-day flaw used in cyberattacks against "targeted individuals," which could signify spyware or nation-state hacking.
0
3
5
Insurers May Limit Payments in Cases of Unpatched CVEs: by Rob Lemos.
darkreading.com
Some insurers look to limit payouts where serious vulnerabilities haven't been handled in a timely manner. Most companies don't like such restrictions.
0
3
8
Detailed spear-phishing emails sent to European government entities in South Korea tied to North Korea, China.
darkreading.com
Detailed spear-phishing emails sent to European government entities in Seoul are being tied to North Korea, China, or both.
1
2
5
Easy ChatGPT Downgrade Attack Undermines GPT-5 Security: by Nate Nelson.
darkreading.com
By using brief, plain clues in their prompts that are likely to influence the app to query older models, a user can downgrade ChatGPT for malicious ends.
1
4
12
Hackers Abuse VPS Infrastructure for Stealth, Speed: by Alexander Culafi.
darkreading.com
New research highlights how threat actors abuse legitimate virtual private server offerings in order to spin up infrastructure cheaply, quietly, and fast.
1
1
1
Prepping the Front Line for MFA Social Engineering Attacks: by Paul Underwood, vice president of security, Neovera.
darkreading.com
With the right mix of training, support, and trust, frontline agents can become your biggest security assets.
1
3
5
DARPA: Closing the Open Source Security Gap With AI: by Alexander Culafi.
darkreading.com
DARPA's Kathleen Fisher discusses the AI Cyber Challenge at DEF CON 33, and the results that proved how automation can help patch vulnerabilities at scale.
0
2
2
Hacktivist Tied to Multiple Cyber Groups Sentenced to Jail: by Kristina Beek #DRGlobal.
darkreading.com
At one point, Al-Tahery Al-Mashriky was hacking thousands of websites within the span of three months while stealing personal data and sensitive information.
0
1
3
DPRK, China Suspected in South Korean Embassy Attacks: by Nate Nelson #DRGlobal.
darkreading.com
Detailed spear-phishing emails sent to European government entities in Seoul are being tied to North Korea, China, or both.
1
1
2
Asian Orgs Shift Cybersecurity Requirements to Suppliers: by Robert Lemos #DRGlobal.
darkreading.com
The uptick in breaches in Asia has prompted a Japanese chipmaker and the Singaporean government to require vendors to pass cybersecurity checks to do business.
1
1
4
FBI, Cisco Warn of Russian Attacks on 7-Year-Old Flaw: by Jai Vijayan.
darkreading.com
"Static Tundra" has breached thousands of end-of-life Cisco devices unpatched against a 2018 flaw, in a campaign targeting enterprises and critical infrastructure.
0
2
3
Cybercriminals Abuse Vibe Coding Service to Create Malicious Sites: by Rob Wright.
darkreading.com
Some LLM-created scripts and emails can lower the barrier of entry for low-skill attackers, who can use services like Lovable to create convincing, effective websites in minutes.
0
2
3
How Warlock Ransomware Targets Vulnerable SharePoint Servers: by Alexander Culafi.
darkreading.com
Researchers highlight how Warlock, a new ransomware heavyweight, uses its sophisticated capabilities to target on-premises SharePoint instances.
0
1
3
Russian Hacktivists Take Aim at Polish Power Plant, Again: by Kristina Beek.
darkreading.com
This attack was seemingly more successful than the first iteration, causing disruptions at the plant.
0
3
8
How to Vibe Code With Security in Mind: by Alexander Culafi.
darkreading.com
As more organizations integrate vibe coding and AI-assisted coding into their application development processes, it's important to remember to put security first.
0
0
4
'RingReaper' Sneaks Right Past Linux EDRs: by Jai Vijayan.
darkreading.com
The highly sophisticated post-compromise tool abuses the Linux kernel's io_uring interface to remain hidden from endpoint detection and response systems.
0
5
9
AI Agents Access Everything, Fall to Zero-Click Exploit: by Rob Wright #DRTheEdge #BHUSA.
darkreading.com
Zenity CTO Michael Bargury joins the Black Hat USA 2025 News Desk to discuss research on a dangerous exploit, how generative AI technology has "grown arms and legs" — and what that means for cyber-...
0
1
1
Millions Allegedly Affected in Allianz Insurance Breach: by Kristina Beek.
darkreading.com
Have I Been Pwned claims that the compromised data includes physical addresses, dates of birth, phone numbers, and more, for life insurance customers.
1
3
4