Latest news as of 5/22/2026, 4:30:14 AM
Dark Reading
Following their attacks on Salesforce instances last year, members of the cybercrime group have broadened their targeting and gotten more aggressive with extortion tactics.
Dark Reading
State-sponsored threat actors compromised the popular code editor's hosting provider to redirect targeted users to malicious downloads.
Dark Reading
Iowa police arrested two penetration testers in 2019 for doing their jobs, highlighting the risk to security professionals in red teaming exercises.
Dark Reading
A malware-free phishing campaign targets corporate inboxes and asks employees to view "request orders," ultimately leading to Dropbox credential theft.
Dark Reading
People trust organizations to do the right thing, but some websites and apps have user interfaces that ultimately lead to inadequate security.
Dark Reading
The AI-assisted attack, which started with exposed credentials from public S3 buckets, rapidly achieved administrative privilges.
Dark Reading
Crowdsourced bug bounties and pen-testing firms see AI agents stealing the low-hanging vulnerabilities from their human counterparts. Oversight remains key.
Dark Reading
The self-replicating malware has poisoned a fresh set of Open VSX software components, leaving potential downstream victims with infostealer infections.
Dark Reading
APT28's attacks rely on specially crafted Microsoft Rich Text Format (RTF) documents to kick off a multistage infection chain to deliver malicious payloads.
Dark Reading
Attackers could even have used one vulnerable Lookout user to gain access to other GCP tenants' environments.