North Korean hackers break ground with new exploitation techniques for Windows and macOS.
| LATEST SECURITY NEWS & COMMENTARY | DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse North Korean hackers break ground with new exploitation techniques for Windows and macOS. Sisense Password Breach Triggers 'Ominous' CISA Warning With stores of mega-corporate business intelligence, a Sisense compromise could potentially mushroom into supply chain cyberattack disaster, experts fear. Critical Rust Flaw Poses Exploit Threat in Specific Windows Use Cases Project behind the Rust programming language asserted that any calls to a specific API would be made safe, even with unsafe inputs, but researchers found ways to circumvent the protections. Apple Warns Users in 150 Countries of Mercenary Spyware Attacks In new threat notification information, Apple singled out Pegasus vendor NSO Group as a culprit in mercenary spyware attacks. Expired Redis Service Abused to Use Metasploit Meterpreter Maliciously Attackers have compromised an 8-year-old version of the cloud platform to distribute various malware that can take over infected systems. Why MLBOMs Are Useful for Securing the AI/ML Supply Chain A machine learning bill of materials (MLBOM) framework can bring transparency, auditability, control, and forensic insight into AI and ML supply chains. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | Cohesity Extends Collaboration to Strengthen Cyber Resilience With IBM Investment in Cohesity National Security Agency Announces Dave Luber As Director of Cybersecurity Wyden Releases Draft Legislation to End Federal Dependence on Insecure, Proprietary Software MedSec Launches Cybersecurity Program For Resource-Constrained Hospitals MORE PRODUCTS & RELEASES |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|