Malware writing is only one of several malicious activities for which the new, uncensored generative AI chatbot can be used.
Follow Dark Reading:
 January 28, 2025
LATEST SECURITY NEWS & COMMENTARY
For $50, Cyberattackers Can Use GhostGPT to Write Malicious Code
Malware writing is only one of several malicious activities for which the new, uncensored generative AI chatbot can be used.
Apple Patches Actively Exploited Zero-Day Vulnerability
The Apple iOS 18.3 update fixes 28 other vulnerabilities identified by the tech company, though there is little information on them.
Change Healthcare Breach Impact Doubles to 190M People
One of the largest data breaches in history was apparently twice as impactful as previously thought, with PII belonging to hundreds of millions of people sitting in the hands of cybercriminals.
Crisis Simulations: A Top 2025 Concern for CISOs
CISOs are planning to adjust their budgets this year to reflect their growing concerns for cybersecurity preparedness in the event of a cyberattack.
USPS Impersonators Tap Trust in PDFs in Smishing Attack Wave
Attackers aim to steal people's personal and payment-card data in the campaign, which dangles the threat of an undelivered package and has the potential to reach organizations in more than 50 countries.
The Case for Proactive, Scalable Data Protection
Whether you're facing growing data demands and increased cyber threats, or simply looking to future-proof your business, it's time to consider the long-term benefits of transitioning to a cloud-first infrastructure.
(Sponsored Article) 5 Reasons It's Time to Unify Your Tool Set
Security operations platforms claim they can resolve challenges of efficiency and siloed security. Is it time for to consider making the switch?
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Cisco: Critical Meeting Management Bug Requires Urgent Patch
The bug has been given a 9.9 CVSS score, and could allow authenticated threat actors to escalate their privileges to admin-level if exploited.

Cloudflare CDN Bug Outs User Locations on Signal, Discord
Attackers can use a zero- or one-click flaw to send a malicious image to targets — an image that can deanonymize a user within seconds, posing a threat to journalists, activists, hackers, and others whose locations are sensitive.

Strengthening Our National Security in the AI Era
For the first time in a long while, the federal government and the software sector alike finally have the tools and resources needed to do security well — consistently and cost-effectively.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
CISOs Are Gaining C-Suite Swagger, but Has It Come With a Cost?
The number of CISOs who report directly to the CEO is up sharply in recent years, but many still say it's not enough to secure adequate resources.
LATEST FROM THE EDGE

3 Use Cases for Third-Party API Security
Third-party API security requires a tailored approach for different scenarios. Learn how to adapt your security strategy to outbound data flows, inbound traffic, and SaaS-to-SaaS interconnections.
LATEST FROM DR TECHNOLOGY

MITRE's Latest ATT&CK Simulations Tackle Cloud Defenses
The MITRE framework's applied exercise provides defenders with critical feedback about how to detect and defend against common, but sophisticated, attacks.
LATEST FROM DR GLOBAL

War Game Pits China Against Taiwan in All-Out Cyberwar
At Black Hat and DEF CON, cybersecurity experts were asked to game out how Taiwan could protect its communications and power infrastructure in case of invasion by China.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.