An undefined Chinese-speaking actor wields a combo of custom malware, open source tools, and LOTL binaries against Windows ...
With rapid advances in AI, we now enter an era of automated risk remediation. Read about readiness to leverage agentic AI for ...
Using Anthropic and OpenAI's AI systems — and a detailed playbook prompt — cyberattackers gained access to Mexico's agencies ...
Iran has been hacking IP cameras to plan missile strikes against its enemies, showing how cyber and kinetic warfare are fast ...
Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat ...
DPRK worker scams are old hat, but they're still working, thanks to AI tools that help with everything from face swapping to daily emails.
The phishing-as-a-service platform was popular among cyber threat actors because of its ability to bypass multi-factor authentication defenses.
Pakistan's APT36 threat group has begun using vibe-coding to churn out mediocre malware, but at a scale that could overwhelm ...
Fig Security's platform traces security data flows end-to-end across SIEMs, pipelines, and response systems to alert teams ...
Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, ...
India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based ...
The global law enforcement crackdown, which began in January 2025, also identified nearly 180 members of the notorious ...