Patches are available for three bugs, but with technical details and PoCs now available, threat actors can craft targeted attacks.
Follow Dark Reading:
 June 30, 2023
LATEST SECURITY NEWS & COMMENTARY
Researchers Detail 4 SAP Bugs, Including Flaw in ABAP Kernel
Patches are available for three bugs, but with technical details and PoCs now available, threat actors can craft targeted attacks.
AI-Enabled Voice Cloning Anchors Deepfaked Kidnapping
Virtual kidnapping is just one of many new artificial intelligence attack types that threat actors have begun deploying, as voice cloning emerges as a potent new imposter tool.
CISA Wants Exposed Government Devices Remediated in 14 Days
Though government agencies have hundreds of devices exposed to the open Internet, experts wonder if CISA is moving at the right pace.
Newbie Akira Ransomware Builds Momentum With Linux Shift
A new version of the double-extortion group's malware reflects a growing trend among ransomware actors to expand cybercrime opportunities beyond Windows.
Thousands of Filipinos, Others Rescued From Forced Cybercrime Labor
Workers were lured in by false job promises from Facebook ads, only to be tricked into committing cybercrimes with no way out.
Apple Objects to UK Bill That Would Break Encrypted Messaging
New online safety bill could force encrypted messaging apps like iMessage and WhatsApp to scan for child abuse material, but platforms warn about privacy implications.
When It Comes to Secure Coding, ChatGPT Is Quintessentially Human
We're still unprepared to fight the security bugs we already encounter, let alone new AI-borne issues.
US Patent Office Data Spill Exposes Trademark Applications
Misconfiguration exposed the physical addresses of 60,000 patent filers over three years.
Cybersecurity Is the Healthcare Your Organization Needs
Organizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of finding a new pill for every security symptom you see.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Generative AI Projects Pose Major Cybersecurity Risk to Enterprises
Developers' enthusiasm for ChatGPT and other LLM tools leaves most organizations largely unprepared to defend against the vulnerabilities that the nascent technology creates.

LetMeSpy Phone-Tracking App Hacked, Revealing User Data
With at least 13,000 compromised devices in the data leak, it is still unknown who the threat actor is or whether or not victims will be personally notified.

3 Strategies for Bringing Rigor to Software Security
With the National Cybersecurity Strategy planning to add real teeth into enforcement actions, software vendors have extra incentive to reduce applications' security debt.

MORE
EDITORS' CHOICE
6 Ways Cybersecurity Is Gut-Checking the ChatGPT Frenzy
Generative AI chatbots like ChatGPT are the buzziest of the buzzy right now, but the cyber community is starting to mature when it comes to assessing where it should fit into our lives.
LATEST FROM DR TECHNOLOGY

Pepper and Embedded Insurance Partner on Cyber Insurance for Consumers, SMBs
Now, if you've got an IoT network powered by Pepper, you can insure it through Embedded Insurance — even if your business is too small to support a SOC.
LATEST FROM THE EDGE

Keep Job Scams From Hurting Your Organization
From fake job listings that ding your reputation to fake job applicants who hack your network, job scams are a major threat.
LATEST FROM DR GLOBAL

UAE, Israel Ink Pivotal Joint Cyber-Threat Intelligence Agreement
Two Mideast nations that were at odds until recently have announced the "Crystal Ball" project, aimed at better protecting against cyberattacks via collaboration and knowledge sharing.
WEBINARS
  • State of DDoS: Mid-Year Threat Report

    Killnet, REvil and Anonymous Sudan - it's been a busy quarter in the DDoS realm. Threat actor groups have been targeting Western organizations in an attempt to disrupt our way of life. If you're finding it hard to keep track ...

  • Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

    Threat intelligence -- collecting data about broad trends in online attacks -- helps security teams improve their defenses by identifying online exploits that have the potential to hit their organizations and to prioritize their security resources accordingly. But how should ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
  • How to Use Threat Intelligence to Mitigate Third-Party Risk

    The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ...

  • Successfully Managing Identity in Modern Cloud and Hybrid Environments

    Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it's as complicated as ever. This report details how to get identity programs on track -- and ...

  • The 10 Most Impactful Types of Vulnerabilities for Enterprises Today

    The enterprise attack surface is constantly expanding. Enterprises have to think beyond zero day vulnerabilities. It's imperative security teams start looking at vulnerabilities in 5G, firmware, edge, and ICS/OT, among others. Managing system vulnerabilities is one of the old ...

View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.