sumi.news
Search
Following
Sign in
← Back to news
D
Dark Reading
RSS Feed
www.darkreading.com
www.darkreading.com/rss.xml
Follow
Latest
Tue Mar 31
TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack
8h
S
Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug
9h
S
Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber
10h
S
Claude Mythos Fears Startle Japan's Financial Services Sector
1d
S
Reverse Engineering With AI Unearths High-Severity GitHub Bug
1d
S
AI Finds 38 Security Flaws in Electronic Health Record Platform
1d
S
Oracle Red Bull Racing Team Revs Up Automation to Boost Security
1d
S
Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
1d
S
Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities
1d
S
BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures
2d
S
NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later
2d
S
Feuding Ransomware Groups Leak Each Other's Data
2d
S
Vidar Rises to Top of Chaotic Infostealer Market
2d
S
Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain
2d
S
UNC6692 Combines Social Engineering, Malware, Cloud Abuse
3d
S
Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation
3d
S
20-Year-Old Malware Rewrites History of Cyber Sabotage
3d
S
Parsing Agentic Offensive Security's Existential Threat
3d
S
Helping Romance Scam Victims Requires a Proactive, Empathic Approach
6d
S
US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
6d
S
Glasswing Secured the Code. The Rest of Your Stack Is Still on You
6d
S
AI Phishing Is No. 1 With a Bullet for Cyberattackers
6d
S
North Korea's Lazarus Targets macOS Users via ClickFix
6d
S
Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets
1w
S
Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia
1w
S
China-Backed Hackers Are Industrializing Botnets
1w
S
Bad Memories Still Haunt AI Agents
1w
S
'Zealot' Shows What AI's Capable of in Staged Cloud Attack
1w
S
Africa Relinquishes Cyberattack Lead to Latin America — For Now
1w
S
'The Gentlemen' Rapidly Rises to Ransomware Prominence
1w
S
DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'
1w
S
Electricity Is a Growing Area of Cyber-Risk
1w
S
Electricity Is a Growing Area of Cyber Risk
1w
S
Ransomware Negotiator Pleads Guilty to BlackCat Scheme
1w
S
Exploits Turn Windows Defender Into Attacker Tool
1w
S
Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk
1w
S
Chinese APT Targets Indian Banks, Korean Policy Circles
1w
S
Google Fixes Critical RCE Flaw in AI-Based 'Antigravity' Tool
1w
S
Vercel Employee's AI Tool Access Led to Data Breach
1w
S
Serial-to-IP Devices Hide Thousands of Old & New Bugs
1w
S
WhatsApp Leaks User Metadata to Attackers
1w
S
How NIST's Cutback of CVE Handling Impacts Cyber Teams
1w
S
Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing
1w
S
Every Old Vulnerability Is Now an AI Vulnerability
1w
S
Coast Guard's New Cybersecurity Rules Offer Lessons for CISOs
1w
S
NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities
2w
S
North Korea Uses ClickFix to Target macOS Users' Data
2w
S
'Harmless' Global Adware Transforms Into an AV Killer
2w
S
Two-Factor Authentication Breaks Free From the Desktop
2w
S
Microsoft's Original Windows Secure Boot Certificate Is Expiring
2w
S
More →