
Dark Reading
@DarkReading
Followers
343K
Following
1K
Media
937
Statuses
36K
One of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.
Joined November 2008
In our latest episode of Heard it From a CISO, Dark Reading’s Kristina Beek is joined by Marshall Erwin, CISO at @fastly, to discuss standout qualities from colleagues and direct reports and what it means to show-up in the face of a cybersecurity crisis. Watch the rest here:
1
3
6
Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks: https://t.co/BDEFRO9H4Y by Rob Wright
darkreading.com
A new adversary tactic, Storm-2603 threat group is abusing the digital forensics & incident response (DFIR) tool for persistent access to victim networks.
0
2
3
Take Note: Cyber-Risks With AI Notetakers: https://t.co/8lC2UQ2pcE by Gadi Evron CEO & founder, Knostic, and Joe Sullivan, CEO, Ukraine Friends, & CEO, Joe Sullivan Security LLC
darkreading.com
Transcription applications are joining your online meetings. Here's how to create policies for ensuring compliance and security of your information.
0
0
1
GitHub Copilot 'CamoLeak' AI Attack Exfiltrates Data: https://t.co/bvskEcHgyW by Nate Nelson
darkreading.com
GitHub is comparatively advanced in how it protects its built-in AI. Still, a researcher came up with a workaround for exfiltrating code and secrets.
0
2
4
SonicWall: 100% of Firewall Backups Possibly Breached: https://t.co/fO7CDSDVUP by Alexander Culafi
darkreading.com
SonicWall said the breach affected firewall configuration files for all customers using SonicWall’s cloud backup service — up from a previous 5% estimate.
0
2
6
Chaos Ransomware Upgrades With Aggressive New C++ Variant: https://t.co/YPJNE2o2Op by Elizabeth Montalbano
darkreading.com
New encryption, wiper, and cryptocurrency-stealing capabilities make the evolving ransomware-as-a-service operation more dangerous than ever.
0
1
2
Vampire Bot Malware Sinks Fangs Into Job Hunters: https://t.co/yK3GMAl2aV by Jai Vijayan
darkreading.com
The campaign is the latest by BatShadow, one of a growing number of cybercrime groups operating out of Vietnam.
0
0
4
Red Hat Hackers Team Up With Scattered Lapsus$ Hunters: https://t.co/FS6BvFz85H by Rob Wright
darkreading.com
Crimson Collective, which recently breached the GitLab instance of Red Hat Consulting, has teamed up with the notorious cybercriminal collective.
0
0
6
3 Extortion Gangs Join Forces in Ransomware 'Cartel': https://t.co/3Kq4gkTzfh by Alexander Culafi
darkreading.com
The three extortion gangs also invited other e-crime attackers to join their collaboration to share attack information and resources.
0
0
3
Framelink's Figma MCP Server Opens Orgs to Agentic AI Compromise: https://t.co/vgK6qP40SJ by Tara Seals
darkreading.com
A bug (CVE-2025-53967) in a popular Web design tool's option for talking to agentic AI allows command injection leading to remote code execution (RCE).
0
0
2
China-Nexus Actors Weaponize 'Nezha' Open Source Tool: https://t.co/MDs9O2nuMl by Nate Nelson #DRGlobal
darkreading.com
A threat actor is putting a spin on classic remote monitoring and management (RMM) attacks, using a Chinese open source tool instead.
1
0
0
Calling All Influencers: Spear-Phishers Dangle Tesla, Red Bull Jobs: https://t.co/eYmet8IU3M by Elizabeth Montalbano
darkreading.com
Cyberattackers continue to evolve lures for job seekers in an impersonation campaign aimed at stealing resumes from social media pros.
0
0
2
Cyberattack Leads to Beer Shortage as Asahi Recovers: https://t.co/XwdmQLgYhz by Robert Lemos #DRGlobal
darkreading.com
A ransomware left the Asahi brewery in Japan struggling to take orders and deliver its products domestically, as manufacturers become a favored target.
1
1
3
Security Concerns Shadow Vibe Coding Adoption: https://t.co/OXFhEoOUlW by Alexander Culafi
darkreading.com
In a recent poll, readers shared how they're using vibe coding in AppDev (if they are at all). While some found success, others found the risks too great.
0
1
2
Attackers Season Spam With a Touch of 'Salt': https://t.co/ltocFpkCXO by Jay Vijayan
darkreading.com
Researchers report an increase in the use of hidden content in spam and malicious email to confuse filters and other security mechanisms.
1
2
2
Medusa Ransomware Actors Exploit Critical Fortra GoAnywhere Flaw: https://t.co/BuvNnBpx1l by Rob Wright
darkreading.com
Researchers say exploitation of CVE-2025-10035 requires a private key, and it's unclear how Storm-1175 threat actors pulled this off.
0
0
2
Dark Reading's Arielle Waldman interviews Christo Butcher at NCC Group to discuss emerging brain computer interface applications and the security concerns that come with them. You can read the rest here: https://t.co/OAMYfPP3X3
0
0
4
Clop Ransomware Hits Oracle Customers Via Zero-Day Flaw: https://t.co/hP9Qu6lTYA by Alexander Culafi
darkreading.com
The infamous Clop gang has targeted a wide range of Oracle E-Business Suite customers using a newly disclosed zero-day vulnerability.
0
0
1
Cyberattackers Exploit Zimbra Zero-Day Via ICS: https://t.co/psFRyc0cOP by Jai Vijayan
darkreading.com
A threat actor purporting to be from the Libyan Navy's Office of Protocol targeted Brazil's military earlier this year using the rare tactic.
0
1
5
Self-Propagating Malware Hits WhatsApp Users in Brazil: https://t.co/3eB6W3xBAI by Elizabeth Montalbano
darkreading.com
The enterprise-focused Water Saci campaign spreads Sorvepotel, which can steal credentials and monitor browser activity to defraud financial institutions.
0
2
2