One long-awaited security move caused a ripple effect in the cybercrime ecosystem.
| LATEST SECURITY NEWS & COMMENTARY | How Cybercriminals Adapted to Microsoft Blocking Macros by Default One long-awaited security move caused a ripple effect in the cybercrime ecosystem. WordPress Plug-in Used in 1M+ Websites Patched to Close Critical Bug The privilege escalation flaw is one in thousands that researchers have disclosed in recent years. 'Very Noisy': For the Black Hat NOC, It's All Malicious Traffic All the Time Black Hat Asia's NOC team gives a look inside what's really happening on the cyberfront during these events. AI Is About to Be Everywhere: Where Will Regulators Be? Regulators should apply a healthy skepticism to generative AI developments to guarantee a competitive marketplace. Malicious Chatbots Target Casinos in Southeast Asia Dubbed "ChattyGoblin," the China-backed actors use chatbots to scam Southeast Asian gambling companies. MORE NEWS / MORE COMMENTARY | | | | HOT TOPICS | Dragos Employee Hacked, Revealing Ransomware, Extortion Scheme Attackers compromised the personal email of a new employee and, when the initial attack failed, attempted through socially engineered messages to get the company to pay them off. Plug-and-Play Microsoft 365 Phishing Tool 'Democratizes' Attack Campaigns New "Greatness" phishing-as-a-service used in attacks targeting manufacturing, healthcare, technology, and other sectors. Startup Competition Secures ML Systems, Vulnerabilities in Automation RSA's Innovation Sandbox 2023 focused on the software supply chain, as well as attack surfaces exposed by generative AI, ML systems, and APIs. MORE |
|
| | WEBINARS | Next-Generation Supply Chain Security Supply chain attacks are on the rise. Attackers are injecting malicious code into software and hardware components to create backdoors into the organization. As the Kaseya attack demonstrated, compromising a widely used product gives attackers privileged access into corporate networks. ... Building the SOC of the Future: Next-Gen Security Operations No matter the industry, the organization's size, or the number of security professionals on staff, organizations need to monitor their systems for potential threats and respond quickly in the event of a compromise. Many enterprises are building out or expanding ... | View More Dark Reading Webinars >> | |
| |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|