The agency asks the cybersecurity community to adopt "romance baiting" in place of dehumanizing language.
| LATEST SECURITY NEWS & COMMENTARY | Interpol: Can We Drop the Term 'Pig Butchering'? The agency asks the cybersecurity community to adopt "romance baiting" in place of dehumanizing language. Microsoft Teams Vishing Spreads DarkGate RAT A thwarted attack demonstrates that threat actors using yet another delivery method for the malware, which already has been spread using phishing emails, malvertising, hijacking of instant messages, and SEO poisoning. Does Desktop AI Come With a Side of Risk? Artificial intelligence capabilities are coming to a desktop near you — with Microsoft 365 Copilot, Google Gemini with Project Jarvis, and Apple Intelligence all arriving (or having arrived). But what are the risks? With 'TPUXtract,' Attackers Can Steal Orgs' AI Models A new side-channel attack method is a computationally practical way to infer the structure of a convolutional neural network — meaning that cyberattackers or rival companies can plagiarize AI models and take their data for themselves. 336K Prometheus Instances Exposed to DoS, 'Repojacking' Open source Prometheus servers and exporters are leaking plaintext passwords and tokens, along with API addresses of internal locations. Efforts to Secure US Telcos Beset by Salt Typhoon Might Fall Flat The rules necessary to secure US communications have already been in place for 30 years, argues Sen. Wyden, the FCC just hasn't enforced them. It's unclear if they will help. Cultivating a Hacker Mindset in Cybersecurity Defense Security isn't just about tools — it's about understanding how the enemy thinks and why they make certain choices. The Importance of Empowering CFOs Against Cyber Threats Working closely with CISOs, chief financial officers can become key players in protecting their organizations' critical assets and ensuring long-term financial stability. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | Wallarm Releases API Honeypot Report Highlighting API Attack Trends CISA Directs Federal Agencies to Secure Cloud Environments Delinea Joins CVE Numbering Authority Program CompTIA Xpert Series Expands With SecurityX Professional Certification Zerto Introduces Cloud Vault Solution for Enhanced Cyber Resilience Through MSPs Versa Introduces Integrated Endpoint Data Loss Prevention in SASE Solution MORE PRODUCTS & RELEASES |
|
Dark Reading Weekly -- Published By Dark Reading Operated by TechTarget, Inc. and its subsidiaries, 275 Grove Street, Newton, Massachusetts, 02466 US | To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|