A black-hat alternative to GPT models specifically designed for malicious activities like BEC, malware, and phishing attacks is here, and will push organizations to level up with generative AI themselves.
| LATEST SECURITY NEWS & COMMENTARY | WormGPT Cybercrime Tool Heralds an Era of AI Malware vs. AI Defenses A black-hat alternative to GPT models specifically designed for malicious activities like BEC, malware, and phishing attacks is here, and will push organizations to level up with generative AI themselves. SolarWinds Attackers Dangle BMWs to Spy on Diplomats Cloaked Ursa/Nobelium gets creative by appealing to the more personal needs of government employees on foreign missions in Kyiv. Killnet Tries Building Russian Hacktivist Clout With Media Stunts Killnet has been more effective at generating headlines than in executing attacks or wreaking any real damage, experts say. Critical RCE Bug in Rockwell Automation PLCs Zaps Industrial Sites Rockwell Automation and CISA warn of security vulnerabilities that affect power plants, factories, and other critical infrastructure sites. Orca Sues Wiz for 'Copying' Its Cloud Security Tech Two fierce cloud security competitors are locked in a legal battle, as Orca accuses Wiz of ripping off its intellectual property. Creating a Patch Management Playbook: 6 Key Questions The vulnerability gap continues to persist, and IT and security teams can play a major role in reducing their attack surface. Okta, Ping Identity, CyberArk & Oracle Lead the IDaaS Omdia Universe Omdia has published its Omdia Universe on IDaaS. This vendor comparison study highlights the capabilities of the vendors in the space. (Sponsored Article) How to Use Log Management to Retrace Your Digital Footsteps Log management tools help IT and security teams monitor and improve a system's performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems. MORE NEWS / MORE COMMENTARY | |
| | WEBINARS | State of DDoS: Mid-Year Threat Report Killnet, REvil and Anonymous Sudan - it's been a busy quarter in the DDoS realm. Threat actor groups have been targeting Western organizations in an attempt to disrupt our way of life. If you're finding it hard to keep track ... Finding a Backup Strategy That Works For You You've been hit with a ransomware, DDoS, natural disaster, or destructive cyberattack. One of the first questions: can we get our data back? Good back-ups are key to business continuity and disaster recovery, but backing up your data in preparation ... | View More Dark Reading Webinars >> | |
| |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|