Fake Employees Pose Real Security Risks – Dark Reading
The security risks posed by fake employees are particularly severe when they secure IT positions with privileged access and administrative permissions. – Read More
The security risks posed by fake employees are particularly severe when they secure IT positions with privileged access and administrative permissions. – Read More
The vulnerabilities themselves aren’t new, but are being exploited in a novel manner that could lead to a “devastating attack.” – Read More
Researchers highlight how Warlock, a new ransomware heavyweight, uses its sophisticated capabilities to target on-premises SharePoint instances. – Read More
Some LLM-created scripts and emails can lower the barrier of entry for low-skill attackers, who can use services like Lovable to create convincing, effective websites in minutes. – Read More
In the past year, “Static Tundra,” aka “Energetic Bear,” has breached thousands of end-of-life Cisco devices unpatched against a 2018 flaw, in a campaign targeting enterprises and critical infrastructure. –…
VisionSpace Technologies’ Andrzej Olchawa and Milenko Starcik discussed a set of vulnerabilities capable of ending space missions at the Black Hat USA 2025 News Desk. – Read More
The combination of Incode’s AI models and AuthenticID’s experience running identity programs at scale in regulated environments will provide customers with holistic fraud signal analysis, multi-modal intelligence, real-time personhood verification,…
We can strip attackers of their power by implementing layered defenses, ruthless patch management, and incident response that assumes failure and prioritizes transparency. – Read More
Exposure of APIs, sensitive data, and corporate documents are just some of the security issues that the purveyor of Big Macs was cooking up. – Read More
The uptick in breaches in Asia has prompted a Japanese chipmaker and the Singaporean government to require vendors to pass cybersecurity checks to do business. – Read More
This attack was seemingly more successful than the first iteration, causing disruptions at the plant. – Read More
Cybersecurity risks can come from everywhere, as these riveting Dark Reading News Desk videos detail. Check out Part 1 of our broadcast coverage of the top research presented at Black…
As more organizations integrate vibe coding and AI-assisted coding into their application development processes, it’s important to remember to put security first. – Read More
The highly sophisticated post-compromise tool abuses the Linux kernel’s io_uring interface to remain hidden from endpoint detection and response systems. – Read More
Zenity CTO Michael Bargury joins the Black Hat USA 2025 News Desk to discuss research on a dangerous exploit, how generative AI technology has “grown arms and legs” —and what…