The Recall AI tool will be available to Copilot+ PC subscribers in December, and can be used to record images of every interaction on the device for review later. Critics say this introduces major privacy and security concerns along with useful functionality.
Follow Dark Reading:
 November 04, 2024
LATEST SECURITY NEWS & COMMENTARY
Privacy Anxiety Pushes Microsoft Recall AI Release Again
The Recall AI tool will be available to Copilot+ PC subscribers in December, and can be used to record images of every interaction on the device for review later. Critics say this introduces major privacy and security concerns along with useful functionality.
EmeraldWhale's Massive Git Breach Highlights Config Gaps
The large-scale operation took advantage of open repositories, hardcoded credentials in source code, and other cloud oversights.
Chinese APTs Cash In on Years of Edge Device Attacks
The sophisticated Chinese cyberattacks of today rest on important groundwork laid during the pandemic and before.
Critical Auth Bugs Expose Smart Factory Gear to Cyberattack
Factory automation software from Mitsubishi Electric and Rockwell Automation could be subject to remote code execution (RCE), denial-of-service (DoS), and more.
Developer Velocity & Security: Can You Get Out of the Way in Time?
When a CISO can articulate risk in context to the business as a whole, development teams can better prioritize their activities.
IT Security Centralization Makes the Use of Industrial Spies More Profitable
As organizations centralize IT security, the risk of espionage is silently becoming a more profitable threat.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
The Case Against Abandoning CrowdStrike Post-Outage
Knee-jerk reactions to major vendor outages could do more harm than good.

North Korea's Andariel Pivots to 'Play' Ransomware Games
The prominent state-sponsored advanced persistent threat (APT), aka Jumpy Pisces, appears to be moving away from its primary cyber-espionage motives and toward wreaking widespread disruption and damage.

China Says Seabed Sentinels Are Spying, After Trump Taps
On the heels of a Chinese APT eavesdropping on phone calls made by Trump and Harris campaign staffers, Beijing says foreign nations have mounted an extensive seafaring espionage effort.

White House Outlines AI's Role in National Security
A national security memorandum on artificial intelligence tasks various federal agencies with securing the AI supply chain from potential cyberattacks and disseminating timely threat information about them.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Cybersecurity Job Market Stagnates, Dissatisfaction Abounds
The 2024 ISC2 Cybersecurity Workforce Study found that amid a tightening job market and dynamic cyber-threat environment, ongoing staffing and skills shortages are putting organizations at serious risk. Can AI move the needle in defenders' favor?
LATEST FROM THE EDGE

4 Main API Security Risks Organizations Need to Address
Misconfigurations, weak authentication, and logic flaws are among the main drivers of API security risks at many organizations.
LATEST FROM DR TECHNOLOGY

OWASP Releases AI Security Guidance
OWASP released guidance materials addressing how to respond to deepfakes, AI security best practices, and how to secure open source and commercial generative AI applications.
LATEST FROM DR GLOBAL

Taiwanese Facebook Biz Pages Fall to Infostealer Phishing Campaign
The threat actors deceive their victims by impersonating the legal teams of companies, well-known Web stores, and manufacturers.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.