A black-hat alternative to GPT models specifically designed for malicious activities like BEC, malware, and phishing attacks is here, and will push organizations to level up with generative AI themselves.
Follow Dark Reading:
 July 14, 2023
LATEST SECURITY NEWS & COMMENTARY
WormGPT Cybercrime Tool Heralds an Era of AI Malware vs. AI Defenses
A black-hat alternative to GPT models specifically designed for malicious activities like BEC, malware, and phishing attacks is here, and will push organizations to level up with generative AI themselves.
SolarWinds Attackers Dangle BMWs to Spy on Diplomats
Cloaked Ursa/Nobelium gets creative by appealing to the more personal needs of government employees on foreign missions in Kyiv.
Killnet Tries Building Russian Hacktivist Clout With Media Stunts
Killnet has been more effective at generating headlines than in executing attacks or wreaking any real damage, experts say.
Critical RCE Bug in Rockwell Automation PLCs Zaps Industrial Sites
Rockwell Automation and CISA warn of security vulnerabilities that affect power plants, factories, and other critical infrastructure sites.
Orca Sues Wiz for 'Copying' Its Cloud Security Tech
Two fierce cloud security competitors are locked in a legal battle, as Orca accuses Wiz of ripping off its intellectual property.
Creating a Patch Management Playbook: 6 Key Questions
The vulnerability gap continues to persist, and IT and security teams can play a major role in reducing their attack surface.
Okta, Ping Identity, CyberArk & Oracle Lead the IDaaS Omdia Universe
Omdia has published its Omdia Universe on IDaaS. This vendor comparison study highlights the capabilities of the vendors in the space.
(Sponsored Article) How to Use Log Management to Retrace Your Digital Footsteps
Log management tools help IT and security teams monitor and improve a system's performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Hackers Exploit Policy Loophole in Windows Kernel Drivers
Using open source tools, attackers target Chinese speakers with malicious drivers with expired certificates, potentially allowing for full system takeover.

Microsoft Discloses 5 Zero-Days in Voluminous July Security Update
Fixes for more than 100 vulnerabilities affect numerous products, including Windows, Office, .Net, and Azure Active Directory, among others.

How to Put Generative AI to Work in Your Security Operations Center
Generative AI is the cybersecurity resource that never sleeps. Here are some of the ways security-focused generative AI can benefit different members of the SOC team.

MORE
EDITORS' CHOICE
Chinese APT Cracks Microsoft Outlook Emails at 25 Government Agencies
Foreign state-sponsored actors likely had access to privileged state emails for weeks, thanks to a token validation vulnerability.
LATEST FROM DR TECHNOLOGY

Decoding Identity and Access Management for Organizations and Consumers
Workforce IAM and consumer IAM are not interchangeable — they serve different purposes and constituencies.

LATEST FROM THE EDGE

How the EU AI Act Will Affect Businesses, Cybersecurity
The draft AI Act represents a significant step in regulating AI technologies, recognizing the need to address the potential risks and ethical concerns.
LATEST FROM DR GLOBAL

African Nations Face Escalating Phishing & Compromised Password Cyberattacks
Cyberattacks against organizations in some African nations increased significantly in 2022, despite a major expansion in cybersecurity hiring to support cloud and digital migration.
WEBINARS
  • State of DDoS: Mid-Year Threat Report

    Killnet, REvil and Anonymous Sudan - it's been a busy quarter in the DDoS realm. Threat actor groups have been targeting Western organizations in an attempt to disrupt our way of life. If you're finding it hard to keep track ...

  • Finding a Backup Strategy That Works For You

    You've been hit with a ransomware, DDoS, natural disaster, or destructive cyberattack. One of the first questions: can we get our data back? Good back-ups are key to business continuity and disaster recovery, but backing up your data in preparation ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.