Patches are available for three bugs, but with technical details and PoCs now available, threat actors can craft targeted attacks.
| LATEST SECURITY NEWS & COMMENTARY | Researchers Detail 4 SAP Bugs, Including Flaw in ABAP Kernel Patches are available for three bugs, but with technical details and PoCs now available, threat actors can craft targeted attacks. AI-Enabled Voice Cloning Anchors Deepfaked Kidnapping Virtual kidnapping is just one of many new artificial intelligence attack types that threat actors have begun deploying, as voice cloning emerges as a potent new imposter tool. CISA Wants Exposed Government Devices Remediated in 14 Days Though government agencies have hundreds of devices exposed to the open Internet, experts wonder if CISA is moving at the right pace. Newbie Akira Ransomware Builds Momentum With Linux Shift A new version of the double-extortion group's malware reflects a growing trend among ransomware actors to expand cybercrime opportunities beyond Windows. Thousands of Filipinos, Others Rescued From Forced Cybercrime Labor Workers were lured in by false job promises from Facebook ads, only to be tricked into committing cybercrimes with no way out. Apple Objects to UK Bill That Would Break Encrypted Messaging New online safety bill could force encrypted messaging apps like iMessage and WhatsApp to scan for child abuse material, but platforms warn about privacy implications. When It Comes to Secure Coding, ChatGPT Is Quintessentially Human We're still unprepared to fight the security bugs we already encounter, let alone new AI-borne issues. US Patent Office Data Spill Exposes Trademark Applications Misconfiguration exposed the physical addresses of 60,000 patent filers over three years. Cybersecurity Is the Healthcare Your Organization Needs Organizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of finding a new pill for every security symptom you see. MORE NEWS / MORE COMMENTARY | |
|
| FEATURED REPORTS | How to Use Threat Intelligence to Mitigate Third-Party Risk The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ... Successfully Managing Identity in Modern Cloud and Hybrid Environments Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it's as complicated as ever. This report details how to get identity programs on track -- and ... The 10 Most Impactful Types of Vulnerabilities for Enterprises Today The enterprise attack surface is constantly expanding. Enterprises have to think beyond zero day vulnerabilities. It's imperative security teams start looking at vulnerabilities in 5G, firmware, edge, and ICS/OT, among others. Managing system vulnerabilities is one of the old ... | View More Dark Reading Reports >> |
|
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|