Dark Reading

Dark Reading

Publication
1 followers

Security threats, vulnerabilities, with gov/natsec context.

Trio of Critical Bugs Spotted in Delta Industrial PLCs
NewsJan 15, 2026

Trio of Critical Bugs Spotted in Delta Industrial PLCs

Researchers from OPSWAT’s Unit 515 uncovered four serious flaws in Delta Electronics’ DVP‑12SE11T programmable logic controller, including three critical CVSS 9+ vulnerabilities. Delta issued a firmware patch just before the 2026 New Year, but many OT environments may delay updates due to...

By Dark Reading
Secure Your Spot at RSAC 2026 Conference
NewsJan 14, 2026

Secure Your Spot at RSAC 2026 Conference

The RSA Conference (RSAC) will convene cybersecurity leaders in San Francisco from March 23‑26, 2026, offering a platform to explore emerging strategies and bold technologies. Simultaneously, GISEC GLOBAL 2026 will gather CISOs, government officials, and ethical hackers across the Middle East and Africa...

By Dark Reading
Taiwan Endures Greater Cyber Pressure From China
NewsJan 14, 2026

Taiwan Endures Greater Cyber Pressure From China

Taiwan’s National Security Bureau reported an average of 2.63 million cyber attacks per day in 2025, a 6 percent rise from the prior year. Energy utilities faced a ten‑fold surge in malicious traffic while hospitals and emergency services saw attacks climb 54 percent....

By Dark Reading
CISO Succession Crisis Highlights How Turnover Amplifies Security Risks
NewsJan 13, 2026

CISO Succession Crisis Highlights How Turnover Amplifies Security Risks

Chief Information Security Officers are facing unprecedented turnover, with average tenure now 18‑26 months. Rapid M&A activity forces CISOs to juggle integration, risk, board advising, and crisis management, leading to burnout and a 66% report of excessive expectations. Surveys show...

By Dark Reading
Cyberattacks Likely Part of Military Operation in Venezuela
NewsJan 7, 2026

Cyberattacks Likely Part of Military Operation in Venezuela

The United States’ Jan. 3 raid that captured Venezuelan President Nicolás Maduro was accompanied by a sudden power and internet outage in Caracas, prompting speculation that U.S. Cyber Command and other agencies deployed offensive cyber capabilities. President Trump hinted at "a...

By Dark Reading
DDoSia Powers Affiliate-Driven Hacktivist Attacks
NewsJan 7, 2026

DDoSia Powers Affiliate-Driven Hacktivist Attacks

Pro‑Russian hacktivist group NoName057(16) has been leveraging a volunteer‑distributed DDoS platform called DDoSia to launch coordinated attacks against government, media and institutional websites linked to Ukraine and Western interests. The tool, now modular and cross‑platform, enables participants with minimal technical...

By Dark Reading
Startup Trends Shaking Up Browsers, SOC Automation, AppSec
NewsJan 5, 2026

Startup Trends Shaking Up Browsers, SOC Automation, AppSec

Startups are reshaping cybersecurity by turning browsers into the new endpoint, leveraging Chrome’s Manifest V3 extensions for Browser Detection and Response, and applying large‑language models to AppSec and SOC automation. MV3‑based extensions from SquareX, Keep Aware and LayerX give real‑time...

By Dark Reading
Advisor360 Gets a Handle on Shadow AI via Automation
NewsJan 5, 2026

Advisor360 Gets a Handle on Shadow AI via Automation

Advisor360, a wealth‑management platform, faced uncontrolled shadow AI use as employees adopted free AI tools, creating security blind spots. Its small security operations center struggled to manually vet tools, taking days to assess risk. In 2024 the firm partnered with...

By Dark Reading
CISOs Face a Tighter Insurance Market in 2026
NewsJan 5, 2026

CISOs Face a Tighter Insurance Market in 2026

Cyber‑insurance premiums have softened but rate cuts are slowing, and insurers now demand verifiable security controls before underwriting. Boards increasingly view cyber coverage as a non‑negotiable component of risk‑management, pairing it with robust controls rather than treating it as a...

By Dark Reading
Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats
NewsJan 2, 2026

Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats

In a year‑end panel, cybersecurity leaders forecast that 2026 will be dominated by AI‑driven threats, with agentic AI and deepfake‑enabled social engineering emerging as top attack vectors. Identity management will shift toward zero‑trust models that include non‑human identities, while supply‑chain...

By Dark Reading
CTO New Year's Resolutions for a More Secure 2026
NewsJan 2, 2026

CTO New Year's Resolutions for a More Secure 2026

Security‑focused CTOs are setting five priority resolutions for 2026. First, they will operationalize AI governance by embedding repeatable controls, model gateways and telemetry into engineering pipelines to enforce "secure to ship" AI features. Second, they will add dedicated security controls...

By Dark Reading
Identity Security 2026: Four Predictions & Recommendations
NewsDec 31, 2025

Identity Security 2026: Four Predictions & Recommendations

Todd Thiemann forecasts four identity‑security trends for 2026. AI agents will move from SaaS sandboxes into core business processes, creating new breach vectors that demand holistic identity controls. Mid‑market firms, facing app sprawl, will finally adopt Identity Governance and Administration...

By Dark Reading
Cybersecurity Predictions 2026: An AI Arms Race and Malware Autonomy
NewsDec 30, 2025

Cybersecurity Predictions 2026: An AI Arms Race and Malware Autonomy

Tyler Shields predicts that 2026 will see an AI‑driven escalation of both offensive cyber attacks and defensive tools, with attackers automating phishing, deep‑fakes, and vulnerability hunting at scale. Security teams will adopt autonomous containment, probabilistic exposure mitigation, and AI‑generated detection...

By Dark Reading
New Tech Deployments That Cyber Insurers Recommend for 2026
NewsDec 30, 2025

New Tech Deployments That Cyber Insurers Recommend for 2026

Cyber insurers see a sharp rise in AI‑driven phishing losses and a drop in vendor‑outage claims in H1 2025, prompting a shift in recommended defenses for 2026. Resilience’s Jud Dressler highlights role‑based access controls as the top technology to limit breach...

By Dark Reading
Dark Reading Confidential: Stop Secrets Creep Across Developer Platforms
NewsDec 29, 2025

Dark Reading Confidential: Stop Secrets Creep Across Developer Platforms

Developers are increasingly leaking sensitive credentials across a growing array of platforms, from Git repositories to collaboration tools like JIRA and Slack. A recent “state of secret sprawl” report identified 23 million secrets in the public domain last year, and experts...

By Dark Reading
SBOMs in 2026: Some Love, Some Hate, Much Ambivalence
NewsDec 29, 2025

SBOMs in 2026: Some Love, Some Hate, Much Ambivalence

Software bills of materials (SBOMs) remain a cornerstone of supply‑chain security, yet widespread adoption stalls due to incomplete data, late‑stage generation, and open‑source gaps. Docker’s Hardened Images showcase a best‑practice model, embedding full SBOMs and Level 3 SLSA provenance, while many...

By Dark Reading
5 Threats That Defined Security in 2025
NewsDec 29, 2025

5 Threats That Defined Security in 2025

2025 was defined by a wave of high‑impact cyber threats, from the Chinese state‑backed APT Salt Typhoon targeting telecom networks and the US National Guard, to severe budget cuts at the Cybersecurity and Infrastructure Security Agency (CISA). The year also saw...

By Dark Reading
Mentorship & Diversity: Shaping the Next Generation of Cyber Experts
NewsDec 26, 2025

Mentorship & Diversity: Shaping the Next Generation of Cyber Experts

Patricia Voight, CISO of Webster Bank, shared her journey from telecom security to leading financial‑services cyber risk, emphasizing the sector’s constant evolution. She highlighted the bank’s mentorship and summer‑intern programs, which deliberately recruit neurodivergent talent and partner with universities. Voight...

By Dark Reading
Dark Reading Opens State of Application Security Survey
NewsDec 26, 2025

Dark Reading Opens State of Application Security Survey

Dark Reading has launched its 2026 State of Application Security survey, extending the 2025 study that gathered insights from over 100 cybersecurity professionals. The new questionnaire adds topics like vibe coding and secure‑coding training while retaining core questions for year‑over‑year...

By Dark Reading
Industry Continues to Push Back on HIPAA Security Rule Overhaul
NewsDec 23, 2025

Industry Continues to Push Back on HIPAA Security Rule Overhaul

The U.S. Department of Health and Human Services unveiled a sweeping update to the HIPAA Security Rule in January 2025, aiming to tighten cybersecurity across hospitals and clinics. A coalition of 100 health‑care groups led by CHIME has called for...

By Dark Reading
Sprawling 'Operation Sentinel' Neutralizes African Cybercrime Syndicates
NewsDec 23, 2025

Sprawling 'Operation Sentinel' Neutralizes African Cybercrime Syndicates

Operation Sentinel, a 19‑nation Interpol‑led effort, dismantled multiple African cybercrime syndicates, arresting 574 suspects and seizing roughly $3 million in assets. The investigation neutralized over 6,000 malicious links and decrypted six ransomware strains, uncovering $21 million in losses from BEC, extortion and...

By Dark Reading
Threat Actors Exploit Zero-Day in WatchGuard Firebox Devices
NewsDec 22, 2025

Threat Actors Exploit Zero-Day in WatchGuard Firebox Devices

WatchGuard disclosed a critical zero‑day vulnerability (CVE‑2025‑14733) in its Firebox firewalls, enabling remote code execution via an out‑of‑bounds write in the Fireware OS. The flaw affects multiple firmware versions and specifically targets the IKEv2 VPN processes, with threat actors actively...

By Dark Reading
Uzbek Users Under Attack by Android SMS-Stealers
NewsDec 22, 2025

Uzbek Users Under Attack by Android SMS-Stealers

Group‑IB reported a fresh wave of Android SMS‑stealer campaigns targeting users in Uzbekistan since October 2025. Threat groups such as TrickyWonders, Blazefang and Ajina distribute malicious APKs via sideloading and Telegram, exploiting stolen Telegram accounts to lure contacts into installation....

By Dark Reading
LongNosedGoblin Caught Snooping on Asian Governments
NewsDec 19, 2025

LongNosedGoblin Caught Snooping on Asian Governments

ESET has identified a new Chinese‑backed advanced persistent threat group, LongNosedGoblin, conducting cyber‑espionage against Japan and other Southeast Asian governments since 2023. The group leverages custom C#/.NET malware and uniquely abuses Windows Group Policy to drop payloads and move laterally...

By Dark Reading
Identity Fraud Among Home-Care Workers Puts Patients at Risk
NewsDec 19, 2025

Identity Fraud Among Home-Care Workers Puts Patients at Risk

Home‑care workers are increasingly sending unqualified friends or relatives to patient visits under false identities, a trend highlighted by recent fraud convictions and court cases in the U.S. and U.K. The Department of Health and Human Services reported 298 personal‑care...

By Dark Reading
A Cybersecurity Playbook for AI Adoption
NewsDec 19, 2025

A Cybersecurity Playbook for AI Adoption

Artificial intelligence now powers 60 % of enterprise security stacks, accelerating data collection, anomaly detection, and risk scoring across the NIST CSF identify and detect functions. However, the article warns that AI’s nondeterministic nature makes it unsuitable for direct enforcement actions...

By Dark Reading
SonicWall Edge Access Devices Hit by Zero-Day Attacks
NewsDec 18, 2025

SonicWall Edge Access Devices Hit by Zero-Day Attacks

SonicWall disclosed a medium‑severity zero‑day vulnerability, CVE‑2025‑40602, affecting the SMA1000 access platform’s management console. The flaw, rated 6.6 CVSS, is being actively exploited in chained attacks that also leverage the critical CVE‑2025‑23006 vulnerability. SonicWall released hotfixes in firmware versions 12.4.3‑03245...

By Dark Reading
Dormant Iran APT Is Still Alive, Spying on Dissidents
NewsDec 18, 2025

Dormant Iran APT Is Still Alive, Spying on Dissidents

Iran’s long‑standing state‑level threat group, known as Prince of Persia or Infy, has resurfaced after years of apparent inactivity. SafeBreach’s latest report shows the APT has been continuously spying on Iranian citizens and dissidents across Iraq, Turkey, India, Europe and...

By Dark Reading
'Cellik' Android RAT Leverages Google Play Store
NewsDec 17, 2025

'Cellik' Android RAT Leverages Google Play Store

Cellik is a Remote Access Trojan offered as a service that automatically wraps malicious payloads around legitimate Android apps downloaded from the Google Play Store. The RAT provides full device control, including screen streaming, keylogging, file system access, and encrypted...

By Dark Reading
Securing the Network Edge: A Comprehensive Framework for Modern Cybersecurity
NewsDec 17, 2025

Securing the Network Edge: A Comprehensive Framework for Modern Cybersecurity

Enterprise computing is rapidly moving to the edge, with analysts forecasting more than $100 billion in annual edge spend by 2030. The proliferation of IoT, AI, 5G and data‑sovereignty mandates is pushing workloads beyond centralized clouds, creating latency, cost and compliance...

By Dark Reading
'Fake Proof' And AI Slop Hobble Defenders
NewsDec 17, 2025

'Fake Proof' And AI Slop Hobble Defenders

Exploitation attempts have surged around the React2Shell vulnerability, a CVSS 10.0 flaw in the popular React UI library. While researchers have published roughly 145 public exploits, many are AI‑generated proof‑of‑concepts that fail to trigger the flaw. These fake PoCs mislead...

By Dark Reading
The Future of Quantum-Safe Networks Depends on Interoperable Standards
NewsDec 17, 2025

The Future of Quantum-Safe Networks Depends on Interoperable Standards

Quantum key distribution is transitioning from laboratory‑scale, point‑to‑point links to multi‑node, carrier‑grade networks. Recent pilots in London and Paris, led by BT, Toshiba, HSBC and Orange Business, demonstrate real‑world QKD deployments combined with post‑quantum cryptography. Industry groups such as ETSI’s...

By Dark Reading
Attackers Use Stolen AWS Credentials in Cryptomining Campaign
NewsDec 17, 2025

Attackers Use Stolen AWS Credentials in Cryptomining Campaign

Attackers compromised AWS Identity and Access Management (IAM) credentials and used them to launch cryptomining workloads on Amazon EC2 and ECS within ten minutes of initial access. AWS GuardDuty flagged the activity, revealing a coordinated campaign that leveraged dry‑run API...

By Dark Reading
Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation
NewsDec 17, 2025

Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation

Law‑enforcement officials from more than 40 African countries gathered in Algiers for Afripol’s sixth heads‑of‑national‑liaison meeting, focusing on cross‑border cybercrime, equipment standardisation, and investigator training. The forum highlighted a surge in digital adoption that has produced an average of 3,153...

By Dark Reading
Why a 17-Year-Old Built an AI Model to Expose Deepfake Maps
NewsDec 16, 2025

Why a 17-Year-Old Built an AI Model to Expose Deepfake Maps

A California high‑school junior, Vaishnav Anand, built an AI model to detect manipulated satellite imagery after becoming a victim of a personal deepfake. He presented his research at MIT’s IEEE Undergraduate Research Technology Conference, highlighting a largely unexplored field known...

By Dark Reading
Why You Should Train Your SOC Like a Triathlete
NewsDec 16, 2025

Why You Should Train Your SOC Like a Triathlete

The article likens SOC development to triathlon training, urging teams to boost data coverage, standardize evidence, and apply AI selectively. It highlights that limited retention (7‑14 days) hides attacker dwell time, and that inconsistent log definitions stall investigations. By extending...

By Dark Reading