Most of the operations were feckless efforts with little impact, but they illustrate how AI is changing the game for inauthentic content on both the adversary and defense sides.
Follow Dark Reading:
 June 03, 2024
LATEST SECURITY NEWS & COMMENTARY
OpenAI Disrupts 5 AI-Powered, State-Backed Influence Ops
Most of the operations were feckless efforts with little impact, but they illustrate how AI is changing the game for inauthentic content on both the adversary and defense sides.
CISO Corner: Federal Cyber Deadlines Loom; Private Chatbot Danger
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: fighting cybersecurity burnout; BlackSuit ransomware; the SEC breach rules and risk management.
LilacSquid APT Employs Open Source Tools, QuasarRAT
The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.
FlyingYeti APT Serves Up Cookbox Malware Using WinRAR
The Russia-aligned FlyingYeti's phishing campaign exploited Ukrainian citizens' financial stress to spread Cookbox malware.
BBC Breach Puts 25K Pension Scheme Members at Risk
Though information such as dates of birth, email addresses, and home addresses were compromised, "the Beeb" assures individuals that financial information is still protected.
Data Privacy in the Age of GenAI
Consumer data is still a prime target for threat actors, and organizational consumption of data must be aligned to protect it. The new rights act seeks to do some of this, but it still needs tweaking.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Okta Warns Once Again of Credential-Stuffing Attacks
This time it's the identity management service provider's cross-origin authentication feature that's being targeted by adversaries.

Shady 'Merry-Go-Round' Ad Fraud Network Leaves Orgs Hemorrhaging Cash
Stealthy ad fraud rings turn legitimate marketing into spam at a large scale, creating 200M+ bid requests daily.

An Argument for Coordinated Disclosure of New Exploits
By adopting a stance of coordinated disclosure for exploits, security researchers can give organizations time to patch vulnerabilities before they are exploited in the wild.

Cops Swarm Global Cybercrime Botnet Infrastructure in 2 Massive Ops
Europol undertook dropper malware botnet takedown while US law enforcement dismantled a sprawling cybercrime botnet for hire.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Leak Site BreachForums Springs Back to Life Weeks After FBI Takedown
It's unclear whether a dataset for sale on the site allegedly containing data from more than 500 million Ticketmaster users is real or just law enforcement bait.
LATEST FROM THE EDGE

Lawyers Ask Forensics Investigators for Help Outside Cybersecurity
Attorneys are increasingly realizing that forensics investigators have skills analyzing documents and uncovering digital clues that could help them in non-cybersecurity cases.
LATEST FROM DR TECHNOLOGY

Picking the Right Database Tech for Cybersecurity Defense
Graph and streaming databases are helping defenders deal with complex, real-time threat and cybersecurity data to find weak points before attackers.
LATEST FROM DR GLOBAL

As Allies, Kenya & US Aim to Bolster Digital Security in Africa
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fast-growing digital economy.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.