'MagicDot' Windows Weakness Allows Unprivileged Rootkit Activity
Dark Reading
by Tara Seals, Managing Editor, News, Dark Reading
3h ago
Malformed DOS paths in file-naming nomenclature in Windows could be used to conceal malicious content, files, and processes ..read more
Visit website
Cyberattack Takes Frontier Communications Offline
Dark Reading
by Dark Reading Staff
8h ago
The local phone and business communications company said that attackers accessed unspecified PII, after infiltrating its internal networks ..read more
Visit website
Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware
Dark Reading
by Nate Nelson, Contributing Writer
10h ago
It turns out that a powerful security solution can double as even more powerful malware, capable of granting comprehensive access over a targeted machine ..read more
Visit website
Cisco Warns of Massive Surge in Password-Spraying Attacks on VPNs
Dark Reading
by Jai Vijayan, Contributing Writer
15h ago
Attackers are indiscriminately targeting VPNs from Cisco and several other vendors in what may be a reconnaissance effort, the vendor says ..read more
Visit website
GPT-4 Can Exploit Most Vulns Just by Reading Threat Advisories
Dark Reading
by Nate Nelson, Contributing Writer
15h ago
Existing AI technology can allow hackers to automate exploits for public vulnerabilities in minutes flat. Very soon, diligent patching will no longer be optional ..read more
Visit website
Auburn's McCrary Institute and Oak Ridge National Laboratory to Partner on Regional Cybersecurity Center
Dark Reading
by
16h ago
..read more
Visit website
ICS Network Controllers Open to Remote Exploit, No Patches Available
Dark Reading
by Dark Reading Staff
16h ago
CISA advisory warns of critical ICS device flaws, but a lack of available fixes leaves network administrators on defense to prevent exploits ..read more
Visit website
Russian APT Group Thwarted in Attack on US Automotive Manufacturer
Dark Reading
by Dark Reading Staff
16h ago
The group gained access to the victim network by duping IT employees with high administrative-access privileges ..read more
Visit website
Rebalancing NIST: Why 'Recovery' Can't Stand Alone
Dark Reading
by Alex Janas
21h ago
The missing ingredient in NIST's newest cybersecurity framework? Recovery ..read more
Visit website
Break Security Burnout: Combining Leadership With Neuroscience
Dark Reading
by Elizabeth Montalbano, Contributing Writer
21h ago
Industry leaders aim to solve the threat to both the mental health of workers and security of organizations with solutions that recognize the enormous pressures facing cybersecurity professionals ..read more
Visit website

Follow Dark Reading on FeedSpot

Continue with Google
Continue with Apple
OR