The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base.
Follow Dark Reading:
 August 03, 2023
LATEST SECURITY NEWS & COMMENTARY
'DarkBERT' GPT-Based Malware Trains Up on the Entire Dark Web
The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base.
China's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure
US officials are concerned that the Beijing-directed cyberattacks could be a precursor to military disruption and broader destructive attacks on citizens and businesses.
Tesla Jailbreak Unlocks Theft of In-Car Paid Features
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.
Apple Users Open to Remote Control via Tricky macOS Malware
The Hidden Virtual Network Computing (hVNC) malware infests Macs and silently executes complete takeovers, with no user permission needed. It also sports persistence through reboots.
CISA: 'Submarine' Backdoor Torpedoes Barracuda Email Security
A China-nexus cyber-espionage campaign rages on with the fourth backdoor to surface in the wild that takes advantage of the CVE-2023-2868 zero-day security bug — with severe threat of lateral movement, CISA warns.
Iran's APT34 Hits UAE With Supply Chain Attack
The prolific APT, also known as OilRig, was caught targeting an IT company's government clients in the region, with the aim of carrying out cyber espionage.
Another AI Pitfall: Digital Mirroring Opens New Cyberattack Vector
The more artificial intelligence builds out our digital personas, the easier it will become for bad actors to target us with more convincing attacks.
CherryBlos Malware Uses OCR to Pluck Android Users' Cryptocurrency
The malware, along with a sister strain dubbed "FakeTrade," was found lurking in Google Play.
Ubuntu Linux Cloud Workloads Face Rampant Root Take Takeovers
Some 40% of Ubuntu Linux cloud workloads subject to GameOverlay security bugs in the OverlayFS module.
Abyss Locker Ransomware Looks to Drown VMware's ESXi Servers
The 4-month-old ransomware gang is now actively targeting VMware's virtual environments with a second variant of its custom malware.
Air-Gapped ICS Systems Targeted by Sophisticated Malware
Researchers uncovered new worming second-stage tools used to locally exfiltrate data from air gapped ICS environments, putting threat actors one step away from transmission of the info to a C2.
Why the California Delete Act Matters
Bill 362 is a perfect template for a nationwide win against data brokers and the privacy infringements they cause.
What Will CISA's Secure Software Development Attestation Form Mean?
The proposed attestation form is meant to help secure the software chain and formalizes the role of the SBOM as the first line of defense.
Why Today's CISOs Must Embrace Change
With change happening faster than ever before, tools can help bridge capability gaps, along with accelerated workforce training.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Canon Inkjet Printers at Risk for Third-Party Compromise via Wi-Fi
Nearly 200 models are affected by vulnerability that may give wireless access to unauthorized third parties.

IT Ops and Security Teams Need Automation, Not Couples Therapy
When their roles intersect, IT ops and security teams often find themselves at odds. Here are some ways to foster collaboration.

Lessons Not Learned From Software Supply Chain Attacks
Businesses that develop business-, mission-, or safety-critical software must learn from previous victims of software supply chain attacks.

MORE
EDITORS' CHOICE
Summer Documentary Watch Party: 8 Sizzling Cybersecurity Tales
From the upcoming Billion Dollar Heist to docs on the Ashley Madison breach and Stuxnet, here are a bevy of films that can scratch that wanna-be hacker itch.
LATEST FROM THE EDGE

Protecting Intellectual Property When It Needs to Be Shared
Companies should use a variety of tools and strategies, both technical and policy, to protect their IP from third-party risk.
LATEST FROM DR TECHNOLOGY

BloodHound Rewrites Open Source Tool, Launches Community Edition
The open source ecosystem for offensive and defensive security technologies is flourishing, giving security teams access to a wide range of tools to do their jobs.
LATEST FROM DR GLOBAL

Website of Israeli Oil Refinery Taken Offline by Pro-Iranian Attackers
The apparent pro-Iranian Cyber Avengers posted images of BAZAN Groups's SCADA systems, diagrams, and programmable logic controller (PLC) code.
WEBINARS
  • Protecting the Database: How to Secure Your Enterprise Data

    For many enterprises, the "crown jewels" are found in their database applications - virtual "crown jewels" of data in traditional database applications that are often linked to the Internet. What are the chief threats to today's databases? How can you ...

  • Where and When Automation Makes Sense For Enterprise Cybersecurity

    A shortage of skilled IT security professionals has made it tempting to try to automate everything. But security teams have to be able to determine which tasks are safe to automate. How does emerging automation technology work, and how can ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.