The popular generative AI (GenAI) model allows hallucinations, easily avoidable guardrails, susceptibility to jailbreaking and malware creation requests, and more at critically high rates, researchers find.
Feb. 12, 2025
Daily Edition
Today’s news and insights for cybersecurity professionals
- Today's News and Features -
TOP STORY
The popular generative AI (GenAI) model allows hallucinations, easily avoidable guardrails, susceptibility to jailbreaking and malware creation requests, and more at critically high rates, researchers find.‎‎‎
Feed image
But there's plenty in it — including two zero-days — that need immediate attention.‎‎‎
Feed image
The vulnerability could allow a threat actor to disable the security feature on a locked device and gain access to user data.‎‎‎
Feed image
The staffers were tasked with building relationships on the ground across the country in local election jurisdictions, teaching election officials tactics on mitigating cyber threats, cyber hygiene, combating misinformation and foreign influence, and more.‎‎‎
Feed image
State-led data privacy laws and commitment to enforcement play a major factor in shoring up business data security, an analysis shows.‎‎‎
THE EDGE
Feed image
The analyst firm recommends defining security and governance processes while reducing friction for business stakeholders.‎‎
DR TECHNOLOGY
Feed image
The combined companies will create a seamless ecosystem of trust, governance, risk, and compliance.‎‎
DR GLOBAL
Feed image
More than half of attacks on Indian businesses come from outside the country, while 45% of those targeting consumers come from Cambodia, Myanmar, and Laos.‎‎
SPONSORED ARTICLE
Feed image
Hackers can't attack what they can't see. Reducing your attack surface is the key to securing your network, applications, and data.‎‎‎
- Commentary -
Opinions from thought leaders around the cybersecurity industry
Salt Typhoon underscores the urgent need for organizations to rapidly adopt modern security practices to meet evolving threats.‎
For too long, we've treated our analysts as mere cogs in a machine, expecting them to conform to the limitations of our tools and processes. It's time to revolutionize security operations.‎
- Upcoming Events -
- More Resources -
- Elsewhere in Cyber Today -
RAPID7
KELA
RELIAQUEST
- Do You Find Today’s Newsletter Helpful? -
Yes
Not sure
No
You received this message because you are subscribed to Dark Reading's Daily newsletter.
If a friend forwarded you this message, sign up here to get it in your inbox. Thoughts about this newsletter? Give us feedback.
Copyright © 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.
Operated by TechTarget, Inc. and its subsidiaries,
275 Grove Street, Newton, Massachusetts, 02466 US