Another two bugs in this month's set of fixes for 63 CVEs were publicly disclosed previously but have not been exploited yet.
| LATEST SECURITY NEWS & COMMENTARY | Microsoft Zero-Days Allow Defender Bypass, Privilege Escalation Another two bugs in this month's set of fixes for 63 CVEs were publicly disclosed previously but have not been exploited yet. 21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers In this Black Hat Europe preview, devices bridging critical machinery with the wider Internet are exposed and subject to numerous supply chain-induced bugs. Danish Energy Attacks Portend Targeting More Critical Infrastructure Targeted attacks against two dozen related companies is just the latest evidence that hackers want a piece of energy. Zero-Days in Edge Devices Become China's Cyber Warfare Tactic of Choice While China is already among the world's most formidable threat actors, a focus on exploiting public-facing appliances makes its state-sponsored APTs more dangerous than ever. Royal Ransom Demands Exceed $275M, Rebrand in Offing The swift-moving ransomware crew continues to evolve quickly and has already attacked more than 350 victims since it was first detected just over a year ago. Steps CISOs Should Take Before, During & After a Cyberattack By creating a plan of action, organizations can better respond to attacks. Google Goes After Scammers Abusing Its Bard AI Chatbot A pair of lawsuits are part of a wider strategy to establish guardrails preventing AI-powered scams, frauds, and harassment, Google's general counsel says. (Sponsored Article) Security Is a Process, Not a Tool Process failures are the root cause of most serious cybersecurity incidents. We need to treat security as a process issue, not try to solve it with a collection of tools. MORE NEWS / MORE COMMENTARY | |
| | WEBINARS | How to Combat the Latest Cloud Security Threats More businesses have shifted critical assets and operations to the cloud, as service providers enhance their security capabilities and companies adapt to more remote workforces. In this webinar, experts outline the top ways that attackers are exploiting cloud services, applications ... Tricks to Boost Your Threat Hunting Game Proactive "threat hunting" is becoming a more common practice for organizations who know it is no longer enough to detect threats and defend against them. How do these enterprises build threat hunting programs? How do they staff them, and what ... | View More Dark Reading Webinars >> | |
| |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|