The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base.
| LATEST SECURITY NEWS & COMMENTARY | 'DarkBERT' GPT-Based Malware Trains Up on the Entire Dark Web The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base. China's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure US officials are concerned that the Beijing-directed cyberattacks could be a precursor to military disruption and broader destructive attacks on citizens and businesses. Tesla Jailbreak Unlocks Theft of In-Car Paid Features Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs. Apple Users Open to Remote Control via Tricky macOS Malware The Hidden Virtual Network Computing (hVNC) malware infests Macs and silently executes complete takeovers, with no user permission needed. It also sports persistence through reboots. CISA: 'Submarine' Backdoor Torpedoes Barracuda Email Security A China-nexus cyber-espionage campaign rages on with the fourth backdoor to surface in the wild that takes advantage of the CVE-2023-2868 zero-day security bug — with severe threat of lateral movement, CISA warns. Iran's APT34 Hits UAE With Supply Chain Attack The prolific APT, also known as OilRig, was caught targeting an IT company's government clients in the region, with the aim of carrying out cyber espionage. Another AI Pitfall: Digital Mirroring Opens New Cyberattack Vector The more artificial intelligence builds out our digital personas, the easier it will become for bad actors to target us with more convincing attacks. CherryBlos Malware Uses OCR to Pluck Android Users' Cryptocurrency The malware, along with a sister strain dubbed "FakeTrade," was found lurking in Google Play. Ubuntu Linux Cloud Workloads Face Rampant Root Take Takeovers Some 40% of Ubuntu Linux cloud workloads subject to GameOverlay security bugs in the OverlayFS module. Abyss Locker Ransomware Looks to Drown VMware's ESXi Servers The 4-month-old ransomware gang is now actively targeting VMware's virtual environments with a second variant of its custom malware. Air-Gapped ICS Systems Targeted by Sophisticated Malware Researchers uncovered new worming second-stage tools used to locally exfiltrate data from air gapped ICS environments, putting threat actors one step away from transmission of the info to a C2. Why the California Delete Act Matters Bill 362 is a perfect template for a nationwide win against data brokers and the privacy infringements they cause. What Will CISA's Secure Software Development Attestation Form Mean? The proposed attestation form is meant to help secure the software chain and formalizes the role of the SBOM as the first line of defense. Why Today's CISOs Must Embrace Change With change happening faster than ever before, tools can help bridge capability gaps, along with accelerated workforce training. MORE NEWS / MORE COMMENTARY | |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|