Attackers can introduce a malicious document in systems such as Microsoft 365 Copilot to confuse the system, potentially leading to widespread misinformation and compromised decision-making processes.
Follow Dark Reading:
 October 15, 2024
LATEST SECURITY NEWS & COMMENTARY
ConfusedPilot Attack Can Manipulate RAG-Based AI Systems
Attackers can introduce a malicious document in systems such as Microsoft 365 Copilot to confuse the system, potentially leading to widespread misinformation and compromised decision-making processes.
Microsoft: Schools Grapple With Thousands of Cyberattacks Weekly
Education, including K-12 schools and universities, has become the third most targeted sector due to the high variety of sensitive data it stores in its databases.
Pokemon Gaming Company Employee Info Leaked in Hack
The gaming company reports that the server has been rebuilt after the leak, but has not confirmed if its insider video game data was leaked.
Serious Adversaries Circle Ivanti CSA Zero-Day Flaws
Suspected nation-state actors are spotted stringing together three different zero-days in the Ivanti Cloud Services Application to gain persistent access to a targeted system.
Why Your Identity Is the Key to Modernizing Cybersecurity
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you do business.
(Sponsored Article) Real-Time Runtime Insights Underpin Cloud Security
Real-time runtime insights meet the urgency of cloud environments where security attacks happen faster than ever.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Marriott & Starwood Face $52M Settlement After Security Breaches
The hotel giant will be held to higher security standards in a series of proposed requirements, including implementing a new annually reviewed security program.

Vulnerability Prioritization & the Magic 8 Ball
Vulnerability prioritization has evolved over the years. Several frameworks exist to help organizations make the right decisions when it comes to deciding which patches to apply and when. But are these better than a Magic 8 Ball?

Retail CISOs Take on More Risk to Foster Innovation
CISOs in consumer and retail organizations appear to accept greater risks to allow for more innovation, which could be a model for future growth.

American Water Reconnects Its Network Taps After Cyber Incident
The company is beginning to bring its systems back online, though the investigation wages on.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
SOC Teams: Threat Detection Tools Are Stifling Us
Threat detection tools yield too many false positives, security pros say, leading to burnout and resentment.
LATEST FROM THE EDGE

The Lingering Beige Desktop Paradox
Organizations are grappling with the risks of having outdated hardware handling core workloads, mission-critical applications no one knows how to update or maintain, and systems that IT and security teams don't know about.
LATEST FROM DR TECHNOLOGY

Fighting Crime With Technology: Safety First
By combining human and nonhuman identity management in one solution, Flock Safety is helping law enforcement solve an impressive number of criminal cases every day.
LATEST FROM DR GLOBAL

Southeast Asian Cybercrime Profits Fuel Shadow Economy
With cybercriminal gangs raking in at least $18 billion regionally — and much more globally — law enforcement and policymakers are struggling to keep up as the syndicates innovate and entrench themselves in national economies.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.