Hacktivism-related DDoS attacks have risen 70% in the region, most often targeting the public sector, while stolen data and access offers dominate the Dark Web.
| LATEST SECURITY NEWS & COMMENTARY | UAE, Saudi Arabia Become Plum Cyberattack Targets Hacktivism-related DDoS attacks have risen 70% in the region, most often targeting the public sector, while stolen data and access offers dominate the Dark Web. Overtaxed State CISOs Struggle With Budgeting, Staffing CISOs for US states face the same kinds of challenges those at private companies do: lots of work to handle, but not necessarily enough money or people to handle it sufficiently well. Unix Printing Vulnerabilities Enable Easy DDoS Attacks All an attacker needs to exploit flaws in the Common Unix Printing System is a few seconds and less than 1 cent in computing costs. Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players Critics viewed the bill as seeking protections against nonrealistic "doomsday" fears, but most stakeholders agree that oversight is needed in the GenAI space. Memory-Safe Code Adoption Has Made Android Safer The number of memory bugs in Android declined sharply after Google began transitioning to Rust for new features in its mobile OS. Novel Exploit Chain Enables Windows UAC Bypass Adversaries can exploit CVE-2024-6769 to jump from regular to admin access without triggering UAC, but Microsoft says it's not really a vulnerability. Millions of Kia Vehicles Open to Remote Hacks via License Plate The vulnerability is the latest discovered in connected vehicles in recent years, and it points out the cyber dangers lurking in automotive APIs. Sloppy Entra ID Credentials Attract Hybrid Cloud Ransomware Microsoft warns that ransomware group Storm-0501 has shifted from buying initial access to leveraging weak credentials to gain on-premises access before moving laterally to the cloud. Could Security Misconfigurations Become No. 1 in OWASP Top 10? As Superman has kryptonite, software has weaknesses — with misconfigurations leading the pack. Top 5 Myths of AI & Cybersecurity Organizations looking to maximize their security posture will find AI a valuable complement to existing people, systems, and processes. Boredom Is the Silent Killer in Your IT Systems An environment that values creativity, continuous learning, and calculated risk-taking can prevent boredom while building a resilient, adaptable team ready to tackle whatever challenges come their way. MORE NEWS / MORE COMMENTARY | | | PRODUCTS & RELEASES | Kevin Mandia Joins Expel's Board of Directors Bishop Fox Announces Cosmos Integration With ServiceNow Retail & Hospitality ISAC Announces Pam Lindemoen As New CSO and VP Darktrace Announces Formal Completion of its Acquisition by Thoma Bravo Palo Alto Networks and Deloitte Expand Strategic Alliance Globally Apono Raises $15.5M Series A Funding for AI-driven, Least Privilege Solution Set MORE PRODUCTS & RELEASES |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|