Less-experienced users of Microsoft's website building platform may not understand all the implications of the access controls in its low- or no-code environment.
Follow Dark Reading:
 November 14, 2024
LATEST SECURITY NEWS & COMMENTARY
Microsoft Power Pages Leak Millions of Private Records
Less-experienced users of Microsoft's website building platform may not understand all the implications of the access controls in its low- or no-code environment.
Zero-Days Win the Prize for Most Exploited Vulns
Among the top exploited zero-day vulnerabilities were bugs found in systems from Citrix and Cisco.
Iranian Cybercriminals Target Aerospace Workers via LinkedIn
The group seeks out aerospace professionals by impersonating job recruiters — a demographic it has targeted in the past as well — then deploys the SlugResin backdoor malware.
Google AI Platform Bugs Leak Proprietary Enterprise LLMs
The tech giant fixed privilege-escalation and model-exfiltration vulnerabilities in Vertex AI that could have allowed attackers to steal or poison custom-built AI models.
Toolkit Vastly Expands APT41's Surveillance Powers
The China-affiliated group is using the highly modular DeepData framework to target organizations in South Asia.
How CISOs Can Lead the Responsible AI Charge
CISOs understand the risk scenarios that can help create safeguards so everyone can use AI safely and focus on the technology's promises and opportunities.
(Sponsored Article) Securing AI With Confidential Computing
By enabling secure AI deployments in the cloud without compromising data privacy, confidential computing may become a standard feature in AI services.
MORE NEWS / MORE COMMENTARY
DON'T MISS TODAY'S VIRTUAL EVENT
Know Your Enemy: Understanding Cybercriminals and Nation-State Actors
Nov. 14, 11:00 a.m. – 5:00 p.m. ET. Who are the cyberattackers behind current attack campaigns, and what is their endgame? How could their tactics and techniques be used against your organization? In this free virtual event, learn about the latest, most prolific threat actors and their methods, and how to protect your enterprise. Register now!
LISTEN TO OUR LATEST PODCAST
Dark Reading Confidential: Quantum Has Landed, So Now What?
NIST's new post-quantum cryptography standards are here, so what comes next? This episode of Dark Reading Confidential digs into the world of quantum computing from a cybersecurity practitioner's point of view — with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University.
MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
2 Zero-Day Bugs in Microsoft's Nov. Update Under Active Exploit
The November 2024 Patch Tuesday update contains a substantially high percentage of remote code execution (RCE) vulnerabilities (including a critical issue in Windows Kerberos), and two other zero-day bugs that have been previously disclosed and could soon come under attack.
LATEST FROM THE EDGE

5 Ways to Save Your Organization From Cloud Security Threats
The shift to cloud means securing your organization's digital assets requires a proactive, multilayered approach.
LATEST FROM DR TECHNOLOGY

Trustwave-Cybereason Merger Boosts MDR Portfolio
The consolidation folds Cybereason’s endpoint detection and response (EDR) platform into Trustwave's managed security services offerings.
LATEST FROM DR GLOBAL

Hamas Hackers Spy on Mideast Gov'ts, Disrupt Israel
APT Wirte is doing double duty, adding all manner of supplemental malware to gain access, eavesdrop, and wipe data, depending on the target.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.