Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Inside the FBI's Strategy for Prosecuting Ransomware

The US government is throwing the book at even midlevel cybercriminals. Is it just — and is it working?

DARKReading
Silk Typhoon Linked to Powerful Offensive Tools, PRC-Backed Companies

An unsealed indictment associated with the Chinese threat group shows its members worked for companies closely aligned with the PRC as part of a larger contractor ecosystem.

The CrowdStrike Outage Was Bad, but It Could Have Been Worse

A year after the largest outage in IT history, organizations need to make an active effort to diversify their technology and software vendors and create a more resilient cyber ecosystem moving forward.

ChatGPT, GenAI Tools Open to 'Man in the Prompt' Browser Attack

A brand-new cyberattack vector allows threat actors to use a poisoned browser extension to inject malicious prompts into all of the top generative AI tools on the market, including ChatGPT, Gemini, and others.

African Orgs Fall to Mass Microsoft SharePoint Exploits

The National Treasury of South Africa is among the half-dozen known victims in South Africa — along with other nations — of the mass compromise of on-premises Microsoft SharePoint servers.

#microsoft
Nimble 'Gunra' Ransomware Evolves With Linux Variant

The emerging cybercriminal gang, which initially targeted Microsoft Windows systems, is looking to go cross-platform using sophisticated, multithread encryption.

Critical Flaw in Vibe-Coding Platform Base44 Exposes Apps

A now-patched authentication issue on the popular vibe-coding platform gave unauthorized users open access to any private application on Base44.

The Hidden Threat of Rogue Access

With the right IGA tools, governance policies, and risk thresholds, enterprises can continuously detect and act on rogue access before attackers do.

Supply Chain Attacks Spotted in GitHub Actions, Gravity Forms, npm

Researchers discovered backdoors, poisoned code, and malicious commits in some of the more popular tool developers, jeopardizing software supply chains.

Root Evidence Bets on New Concept for Vulnerability Patch Management

The number of concerning vulnerabilities may be much smaller than organizations think, and this cybersecurity startup aims to narrow down the list to the most critical ones.