Microsoft has disclosed fewer flaws and zero-days in the first three months of 2024 compared with the first quarter of the prior four years.
Follow Dark Reading:
 March 13, 2024
LATEST SECURITY NEWS & COMMENTARY
Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update
Microsoft has disclosed fewer flaws and zero-days in the first three months of 2024 compared with the first quarter of the prior four years.
Google's Gemini AI Vulnerable to Content Manipulation
Like ChatGPT and other GenAI tools, Gemini is susceptible to attacks that can cause it to divulge system prompts, reveal sensitive information, and execute potentially malicious actions.
Critical ChatGPT Plug-in Vulnerabilities Expose Sensitive Data
The vulnerabilities found in ChatGPT plug-ins — since remediated — heighten the risk of proprietary information being stolen and the threat of account takeover attacks.
'Magnet Goblin' Exploits Ivanti 1-Day Bug in Mere Hours
A prolific but previously hidden threat actor turns public vulnerabilities into working exploits before companies have time to patch.
'PixPirate' RAT Invisibly Triggers Wire Transfers From Android Devices
A multitooled Trojan cuts apart Brazil's premier wire transfer app. Could similar malware do the same to Venmo, Zelle, or PayPal?
Israeli Universities Hit by Supply Chain Cyberattack Campaign
Iranian hacktivist group known as Lord Nemesis and Nemesis Kitten targeted an academic sector software firm in Israel to gain access to its customers.
How to Identify a Cyber Adversary: Standards of Proof
Identifying the who, what, and how behind a cyberattack is crucial for preventing future strikes.
GAO: CISA's OT Teams Inadequately Staffed
The response teams have a staging shortage, leaving them ill-prepared to take on significant threats from different places at once.
(Sponsored Article) CNAPP Must Evolve to Bring SecOps Into the Fold
With more business-critical applications in the cloud, CNAPP must converge cloud security and security operations to effectively manage cloud risk.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Japan Blames North Korea for PyPI Supply Chain Cyberattack
Open source software ecosystem compromise leaves developers in Asia and around the globe at risk.

How Not to Become the Target of the Next Microsoft Hack
The alarming number of cyber threats targeting Microsoft cloud applications shows cybersecurity needs an overhaul.

Typosquatting Wave Shows No Signs of Abating
A spate of recent typosquatting attacks shows the scourge of this type of attack is still very much with us, even after decades of cyber defender experience with it.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
The CISO Role Is Changing. Can CISOs Themselves Keep Up?
What happens to security leaders that don't communicate security well enough? "Ask SolarWinds."
LATEST FROM THE EDGE

Name That Edge Toon: How Charming
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
LATEST FROM DR TECHNOLOGY

Google's Post-Quantum Upgrade Doesn't Mean We're All Protected Yet
Just because Google has put in the work to quantum-proof Chrome doesn't mean post-quantum security is all set.
LATEST FROM DR GLOBAL

Cyberattack Targets Regulator Database in South Africa
The Companies and Intellectual Property Commission (CIPC), which handles registration of businesses and intellectual property rights for the nation, called the breach "isolated."
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.