darkreading Public RSS feed
- Russian Hacktivists Take Aim at Polish Power Plant, Againby Kristina Beek on August 19, 2025 at 9:17 pm
This attack was seemingly more successful than the first iteration, causing disruptions at the plant.
- Agentic AI, Apple Intelligence, EV Chargers: Everyday Cybersecurity Peril Abounds for Businessesby Becky Bracken on August 19, 2025 at 8:54 pm
Cybersecurity risks can come from everywhere, as these riveting Dark Reading News Desk videos detail. Check out Part 1 of our broadcast coverage of the top research presented at Black Hat USA 2025.
- How to Vibe Code With Security in Mindby Alexander Culafi on August 19, 2025 at 8:25 pm
As more organizations integrate vibe coding and AI-assisted coding into their application development processes, it’s important to remember to put security first.
- ‘RingReaper’ Sneaks Right Past Linux EDRsby Jai Vijayan, Contributing Writer on August 19, 2025 at 8:01 pm
The highly sophisticated post-compromise tool abuses the Linux kernel’s io_uring interface to remain hidden from endpoint detection and response systems.
- AI Agents Access Everything, Fall to Zero-Click Exploitby Rob Wright on August 19, 2025 at 7:02 pm
Zenity CTO Michael Bargury joins the Black Hat USA 2025 News Desk to discuss research on a dangerous exploit, how generative AI technology has “grown arms and legs” βand what that means for cyber risk.
- Millions Allegedly Affected in Allianz Insurance Breachby Kristina Beek on August 19, 2025 at 6:50 pm
Have I Been Pwned claims that the compromised data includes physical addresses, dates of birth, phone numbers, and more, for life insurance customers.
- PipeMagic Backdoor Resurfaces as Part of Play Ransomware Attack Chainby Elizabeth Montalbano, Contributing Writer on August 19, 2025 at 5:16 pm
Attackers are wielding the sophisticated modular malware while exploiting CVE-2025-29824, a previously zero-day flaw in Windows Common Log File System (CLFS) that allows attackers to gain system-level privileges on compromised systems.
- 10 Major GitHub Risk Vectors Hidden in Plain Sightby Liad Cohen, Eyal Paz on August 19, 2025 at 2:00 pm
By addressing these overlooked risk vectors, organizations can continue leveraging GitHub’s innovation while protecting against sophisticated supply chain attacks targeting interconnected software.
- ‘DripDropper’ Hackers Patch Their Own Exploitby Jai Vijayan, Contributing Writer on August 19, 2025 at 1:00 pm
An attacker is breaking into Linux systems via a widely abused 2-year-old vulnerability in Apache ActiveMQ, installing malware and then patching the flaw.
- Secure AI Use Without the Blind Spotsby Joan Goodchild on August 18, 2025 at 9:45 pm
Why every company needs a clear, enforceable AI policy β now.
- Noodlophile Stealer Hides Behind Bogus Copyright Complaintsby Alexander Culafi on August 18, 2025 at 8:28 pm
Noodlophile is targeting enterprises in spear-phishing attacks using copyright claims as phishing lures.
- Workday Breach Likely Linked to ShinyHunters Salesforce Attacksby Elizabeth Montalbano, Contributing Writer on August 18, 2025 at 5:00 pm
The HR giant said hackers mounted a socially engineered cyberattack on its third-party CRM system but did not gain access to customer information; only “commonly available” business contact info was exposed.
- How Evolving RATs Are Redefining Enterprise Security Threatsby Aditya K. Sood on August 18, 2025 at 2:00 pm
A more unified and behavior-aware approach to detection can significantly improve security outcomes.
- Internet-wide Vulnerability Enables Giant DDoS Attacksby Nate Nelson, Contributing Writer on August 18, 2025 at 1:50 pm
A good chunk of all websites today have been affected by the biggest DDoS risk on the Web since 2023.
- Defending Against Cloud Threats Across Multicloud Environmentsby Robert Lemos, Contributing Writer on August 18, 2025 at 12:22 pm
The vast majority of companies are using more than one cloud platform, yet struggle to establish and monitor security across different environments giving attackers an opening.