darkreading.com

Vulnerability Exploitation Is Shifting in 2024-25

The number of vulnerabilities exploited by attacks may not be growing these days...

SAP NetWeaver Visual Composer Flaw Under Active Exploit...

CVE-2025-31324 is a maximum severity bug that attackers exploited weeks before S...

AI, Automation, and Dark Web Fuel Evolving Threat Lands...

Attackers are leveraging the benefits of new technology and the availability of ...

DoJ Data Security Program Highlights Data Sharing Chall...

The Department of Justice announced compliance rules for the Data Security Progr...

Forget the Stack; Focus on Control

Security teams are under more pressure than ever — and cybersecurity debt is add...

Mobile Applications: A Cesspool of Security Issues

An analysis of more than a half-million mobile apps find encryption problems, pr...

How Organizations Can Leverage Cyber Insurance Effectively

By focusing on prevention, education, and risk transfer through insurance, organ...

Phishing Kit Darcula Gets Lethal AI Upgrade

Recently added artificial intelligence capabilities on the Chinese-language Darc...

Vehicles Face 45% More Attacks, 4 Times More Hackers

Two kinds of attacks are in high gear: ransomware attacks against OEMs and compr...

Gig Worker Platforms at Risk for Data Breaches, Fraud, ...

Fraudsters are targeting high-turnover workforces and compromising accounts that...

'SessionShark' ToolKit Evades Microsoft Office 365 MFA

The creators of the toolkit are advertising it as an educational and ethical res...

Max-Severity Commvault Bug Alarms Researchers

Though already patched, the vulnerability is especially problematic because of t...

NFC-Powered Android Malware Enables Instant Cash-Outs

Researchers at security vendor Cleafy detailed a malware known as "SuperCard X" ...

FBI: Cybercrime Losses Rocket to $16.6B in 2024

The losses are 33% higher than the year before, with phishing leading the way as...

Navigating Regulatory Shifts & AI Risks

By proactively embracing emerging trends around encryption, AI security, and pla...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.