Attackers are betting that the hype around generative AI (GenAI) is attracting less technical, less cautious developers who might be more inclined to download an open source Python code package for free access, without vetting it or thinking twice.
Follow Dark Reading:
 November 25, 2024
LATEST SECURITY NEWS & COMMENTARY
Faux ChatGPT, Claude API Packages Deliver JarkaStealer
Attackers are betting that the hype around generative AI (GenAI) is attracting less technical, less cautious developers who might be more inclined to download an open source Python code package for free access, without vetting it or thinking twice.
China's Cyber Offensives Built in Lockstep With Private Firms, Academia
The scale of Beijing's systematic tapping of private industry and universities to build up its formidable hacking and cyber-warfare capabilities is larger than previously understood.
Leaky Cybersecurity Holes Put Water Systems at Risk
At least 97 major water systems in the US have serious cybersecurity vulnerabilities and compliance issues, raising concerns that cyberattacks could disrupt businesses, industry, and the lives of millions of citizens.
Going Beyond Secure by Demand
Secure by Demand offers a starting point for third-party risk management teams, but they need to take the essential step of using a mature software supply chain security solution to ensure they're not blindly trusting a provider's software.
(Sponsored Article) Data Is the Foundation of Identity Security
It's impossible to make cybersecurity decisions without putting data-informed context into every identity that spans your enterprise.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
MITRE: Cross-Site Scripting Is 2024's Most Dangerous Software Weakness
In addition to XSS, MITRE and CISA's 2024 list of the 25 most dangerous security vulnerability types (CWEs) also flagged out-of-bounds write, SQL injection, CSRF, and path traversal.

Cybersecurity Is Critical, but Breaches Don't Have to Be Disasters
The future of cybersecurity isn't about preventing every breach — it's about learning and growing stronger with each attack.

Name That Toon: Meeting of Minds
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.

Scattered Spider Cybercrime Members Face Prison Time
Four of the arrested individuals of the cybercriminal gang, known for hacking MGM and Caesars, are American, all of whom could face up to 27 years in prison for the charges against them.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Chinese APT Gelsemium Deploys 'Wolfsbane' Linux Variant
In a sign of the times, a backdoor malware whose ancestors date back to 2005 has morphed to target Linux systems.
LATEST FROM THE EDGE

What Talent Gap? Hiring Practices Are the Real Problem
While the need for cybersecurity talent still exists, the budget may not. Here's how to maximize security staff despite hiring freezes.
LATEST FROM DR TECHNOLOGY

Microsoft Highlights Security Exposure Management at Ignite
Building on its broad security portfolio, Microsoft's new exposure management is now available in the Microsoft Defender portal, with third-party connectors on the way.
LATEST FROM DR GLOBAL

Yakuza Victim Data Leaked in Japanese Agency Attack
A local government resource for helping Japanese citizens cut ties with organized crime was successfully phished in a tech support scam, and could have dangerous consequences.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.