Dark Reading's Avatar

Dark Reading

@darkreading.bsky.social

One of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.

1,402 Followers  |  17 Following  |  367 Posts  |  Joined: 24.11.2024  |  1.4941

Latest posts by darkreading.bsky.social on Bluesky

Preview
Those 'Summarize With AI' Buttons May Be Lying to You Microsoft uncovered AI recommendation poisoning in 31 companies across 14 industries, and turnkey tools make it trivially easy to pull off.

Those 'Summarize With AI' Buttons May Be Lying to You: https://bit.ly/3MojnnK by Jai Vijayan

12.02.2026 22:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Top Cyber Industry Defenses Spike CO2 Emissions Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.

Top Cyber Industry Defenses Spike CO2 Emissions: https://bit.ly/4bPxahu by Nate Nelson #RSAC

12.02.2026 22:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Senegalese Data Breaches Expose Lack of 'Security Maturity' Green Blood Group steals personal records and biometric data of the West African nation's nearly 20 million residents.

Senegalese Data Breaches Expose Lack of 'Security Maturity': https://bit.ly/4crLvkn by Nate Nelson #DRGlobal

12.02.2026 21:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Asia Fumbles With Throttling Back Telnet Traffic in Region Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall, the region lagged in curbing Telnet traffic.

Asia Fumbles With Throttling Back Telnet Traffic in Region: https://bit.ly/4aPCrDJ by Rob Lemos #DRGlobal

11.02.2026 21:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
1Password Addresses Critical AI Browser Agent Security Gap The security company looks to tackle new authentication challenges that could lead to credential leakage, as enterprises increasingly leverage AI browser agents.

Latest on @darkreading.bsky.social
#DRTechnology: 1Password Addresses Critical AI Browser Agent Security Gap https://zpr.io/8mSsG9eVGhtA #darkreading #cybersecurity

11.02.2026 20:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
1Password Addresses Critical AI Browser Agent Security Gap The security company looks to tackle new authentication challenges that could lead to credential leakage, as enterprises increasingly leverage AI browser agents.

Latest on @darkreading.bsky.social DR Technology: 1Password Addresses Critical AI Browser Agent Security Gap https://zpr.io/8mSsG9eVGhtA #DRTechnology #darkreading #cybersecurity

11.02.2026 20:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Automaker Secures the Supply Chain With Developer-Friendly Platform How a platform engineering team embeds supply chain security into infrastructure without slowing developers.

Latest on @darkreading.bsky.social DR Technology: Automaker Secures the Supply Chain With Developer-Friendly Platform https://zpr.io/ashTv9nKfbWG #DRTechnology #darkreading #cybersecurity

11.02.2026 20:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Automaker Secures the Supply Chain With Developer-Friendly Platform How a platform engineering team embeds supply chain security into infrastructure without slowing developers.

Latest on @darkreading.bsky.social
#DRTechnology: Automaker Secures the Supply Chain With Developer-Friendly Platform https://zpr.io/ashTv9nKfbWG #darkreading #cybersecurity

11.02.2026 20:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How to Stay on Top of Future Threats With a Cutting-Edge SOC CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security.

Latest on @darkreading.bsky.social
#DRTheEdge: How to Stay on Top of Future Threats With a Cutting-Edge SOC https://zpr.io/SXbbUgr2USwH #darkreading #cybersecurity

11.02.2026 19:25 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
SolarWinds WHD Attacks Highlight Dangers of Exposed Apps Organizations that have exposed their instances of Web Help Desk to the public Internet have inadvertently made them prime targets for attackers.

SolarWinds WHD Attacks Highlight Risks of Exposed Apps: https://bit.ly/4tBl2an by Rob Wright

10.02.2026 22:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware' With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or targeted social engineering.

In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware': https://bit.ly/4qpFhot by Alexander Culafi

10.02.2026 22:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.

OT Attacks Get Scary With 'Living-off-the-Plant' Techniques: https://bit.ly/4traPgm by Nate Nelson #RSAC

10.02.2026 21:56 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Microsoft Patches 6 Actively Exploited Zero-Days Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in multiple Microsoft products.

Microsoft Patches 6 Actively Exploited Zero-Days: https://bit.ly/4aupizz by Jai Vijayan

10.02.2026 21:54 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
TransUnion's Real Networks Deal Focuses on Robocall Blocking The acquisition allows the credit reporting agency to add SMS spam and scam prevention to its robocall blocking capabilities.

Latest on @darkreading.bsky.social
#DRTechnology: TransUnion's Real Networks Deal Focuses on Robocall Blocking https://zpr.io/PL9MWy23EJ6D #darkreading #cybersecurity

10.02.2026 13:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
TeamPCP Turns Cloud Infrastructure into Crime Bots The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and interfaces.

TeamPCP Turns Cloud Infrastructure into Crime Bots: https://bit.ly/3ZX5VKz by Jai Vijayan

09.02.2026 22:15 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Black Basta Bundles BYOVD With Ransomware Payload Researchers discovered a vulnerable driver embedded in Black Basta's ransomware, illustrating the increasing popularity of the defense evasion technique.

Black Basta Bundles BYOVD With Ransomware Payload: https://bit.ly/3MukIcC by Rob Wright

09.02.2026 22:14 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Shai-hulud: The Hidden Cost of Supply Chain Attacks Recent supply chain attacks involving self-propagating worms have spread far, but the damage and long-term impact is hard to quantify.

Shai-hulud: The Hidden Cost of Supply Chain Attacks: https://bit.ly/3NZ4itf by Alex Culafi

06.02.2026 21:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
OpenClaw's Gregarious Insecurities Make Safe Usage Difficult Malicious "skills" and persnickety configuration are just a few issues that security researchers have found when installing the OpenClaw AI assistant.

OpenClaw's Gregarious Insecurities Make Safe Usage Difficult: https://bit.ly/3M83iT5 by Robert Lemos

06.02.2026 21:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
"Encrypt It Already" Campaign Pushes Big Tech to Prioritize E2E Encryption The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption by default across their services, as privacy concerns mount amid increased AI use.

Latest on @darkreading.bsky.social
#DRTheEdge: "Encrypt It Already" Campaign Pushes Big Tech to Prioritize E2E Encryption https://zpr.io/cttbj2iWHKrJ #darkreading #cybersecurity

06.02.2026 18:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Data Tool to Triage Exploited Vulnerabilities Can Make KEV More Useful A disconnect exists between the organization's cybersecurity needs and lists like CISA's KEV Catalog. KEV Collider combines data from multiple open-source vulnerability frameworks to help security teams quickly assess which are important, based on their priorities.

Latest on @darkreading.bsky.social
#DRTechnology: Data Tool to Triage Exploited Vulnerabilities Can Make KEV More Useful https://zpr.io/GzDPPq8L59Dc #darkreading #cybersecurity

06.02.2026 13:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Data Tool to Triage Exploited Vulnerabilities Can Make KEV More Useful A disconnect exists between the organization's cybersecurity needs and lists like CISA's KEV Catalog. KEV Collider combines data from multiple open-source vulnerability frameworks to help security teams quickly assess which are important, based on their priorities.

Latest on @darkreading.bsky.social DR Technology: Data Tool to Triage Exploited Vulnerabilities Can Make KEV More Useful https://zpr.io/GzDPPq8L59Dc #DRTechnology #darkreading #cybersecurity

06.02.2026 13:20 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Cyber Success Trifecta: Education, Certifications & Experience Colonel Georgeo Xavier Pulikkathara, CISO at iMerit discusses the importance of fundamentals, continuous learning, and human ingenuity.

Cyber Success Trifecta: Education, Certifications & Experience: https://bit.ly/4r6DZ2U by Kristina Beek #DRTheEdge

05.02.2026 21:35 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis Iranian threat actors have been stealing credentials from people of interest across the Middle East, using spear-phishing and social engineering.

Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis: https://bit.ly/4a26QiU by Nate Nelson #DRGlobal

05.02.2026 21:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Extra! Extra! Announcing DR Global Latin America Dark Reading has something new hitting newsstands: a content section purpose-built for LatAm readers, featuring news, analysis, features, and multimedia.

Extra Extra! Announcing DR Global Latin America: https://bit.ly/4axpeAb by Tara Seals

04.02.2026 22:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Attackers Use Windows Screensavers to Drop Malware, RMM Tools By tapping the unusual .scr file type, attackers leverage "executables that don't always receive executable-level controls," one researcher noted.

Attackers Use Windows Screensavers to Drop Malware, RMM Tools: https://bit.ly/4cc7Lyt by Alexander Culafi

04.02.2026 21:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Big Breach or Smooth Sailing? Mexican Govt Faces Leak Allegations Hacktivist group claims a 2.3-terabyte data breach exposes information of 36 million Mexicans, but no sensitive accounts are at risk, the government says.

Big Breach or Smooth Sailing? Mexican Gov't Faces Leak Allegations: https://bit.ly/4awohIp by Rob Lemos #DRGlobal

04.02.2026 21:57 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Google Looker Bugs Allow Cross-Tenant RCE, Data Exfil Attackers could even have used one vulnerable Lookout user to gain access to other Google Cloud tenants' environments.

Google Looker Bugs Allow Cross-Tenant RCE, Data Exfil: https://bit.ly/4cb7Y55 by Nate Nelson

04.02.2026 21:32 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
AI May Supplant Pen Testers, But Oversight & Trust Is Not There Yet Crowd-sourced bug bounties and pentesting firms see AI agents stealing the low-hanging vulnerabilities from their human counterparts, but oversight remains key.

Latest on @darkreading.bsky.social
#DRTechnology: AI May Supplant Pen Testers, But Oversight & Trust Is Not There Yet https://zpr.io/S6WG9cS8Yc2R #darkreading #cybersecurity

04.02.2026 13:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
AI May Supplant Pen Testers, But Oversight & Trust Is Not There Yet Crowd-sourced bug bounties and pentesting firms see AI agents stealing the low-hanging vulnerabilities from their human counterparts, but oversight remains key.

Latest on @darkreading.bsky.social DR Technology: AI May Supplant Pen Testers, But Oversight & Trust Is Not There Yet https://zpr.io/S6WG9cS8Yc2R #DRTechnology #darkreading #cybersecurity

04.02.2026 13:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days APT28's attacks use specially crafted Microsoft Rich Text Format (RTF) documents to kick off a multistage infection chain to deliver malicious payloads.

Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days: https://bit.ly/3NXMqPm by Jai Vijayan

03.02.2026 22:58 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@darkreading is following 17 prominent accounts