Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Think Like an Attacker: Cybersecurity Tips From a CISO

Etay Maor, a cybersecurity strategist and professor, shares his journey, insights, and advice on breaking into the diverse and ever-evolving field of cybersecurity.

DARKReading
Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files

A new version of VolkLocker, wielded by the pro-Russia RaaS group CyberVolk, has some key enhancements but one fatal flaw.

The CISO-COO Partnership: Protecting Operational Excellence

Digital transformation has made cybersecurity preparation part of operational resilience for most organizations. This calls for a new relationship between CISOs and COOs.

#git
React2Shell Exploits Flood the Internet as Attacks Continue

As exploitation activity against CVE-2025-55182 ramps up, researchers are finding some proof-of-concept exploits contain bypasses for web application firewall (WAF) rules.

Vibe Coding: Innovation Demands Vigilance

Unmanaged coding is indeed an alluring idea, but can introduce a host of significant cybersecurity dangers.

Microsoft Will Bundle Security Copilot With M365 Enterprise Licenses

The move aims to expand the use of Security Copilot and comes with the launch of 12 new agents from Microsoft at the company's Ignite conference last week.

Supply Chain Attacks Targeting GitHub Actions Increased in 2025

At this week's Black Hat Europe conference, two researchers urged developers to adopt a shared responsibility model for open source software and not leave it all up to GitHub to handle.

Are Trade Concerns Trumping US Cybersecurity?

The Trump administration appears to have dropped sanctions against Chinese actors for the Salt Typhoon attacks on US telecoms; but focusing on diplomacy alone misses the full picture, experts say.

Hamas-Linked Hackers Probe Middle Eastern Diplomats

Hamas's best hackers have been maturing, building better malware, and spreading their attacks more widely across the region.

Money Mules Require Banks to Switch From Defense to Offense

Financial institutions must be proactive when identifying and preventing fraudulent activity. Here are five "mule personas" to watch for.