35 years after the Morris worm, we're still dealing with a version of the same issue: data overlapping with control.
Follow Dark Reading:
 March 05, 2024
LATEST SECURITY NEWS & COMMENTARY
Zero-Click GenAI Worm Spreads Malware, Poisoning Models
35 years after the Morris worm, we're still dealing with a version of the same issue: data overlapping with control.
Amex Customer Data Exposed in Third-Party Breach
The breach occurred through a third-party service provider frequently used by the company's travel services division.
Critical TeamCity Bugs Endanger Software Supply Chain
Customers should immediately patch critical vulnerabilities in on-prem deployments of the CI/CD pipeline tool JetBrains TeamCity that could allow threat actors to gain admin control over servers.
Predator Spyware Alive & Well and Expanding
Mercenary spyware operator has rebuilt its network infrastructure and now operates in 11 countries, with one of the newest additions, Botswana.
What Cybersecurity Chiefs Need From Their CEOs
By helping CISOs navigate the expectations being placed on their shoulders, CEOs can greatly benefit their companies.
GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia
Ransomware cybercrime gangs GhostSec and Stormous have teamed up in widespread double-extortion attacks.
Middle East Leads in Deployment of DMARC Email Security
Yet challenges remain as many nation's policies for the email authentication protocol remain lax and could run afoul of Google's and Yahoo's restrictions.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
CISO Corner: Operationalizing NIST CSF 2.0; AI Models Run Amok
Dark Reading's roundup of strategic cyber-operations insights for chief information security officers and security leaders. Also this week: SEC enforcement actions, biometrics regulation, and painful encryption changes in the pike.

NIST Cybersecurity Framework 2.0: 4 Steps to Get Started
The National Institute of Standards and Technology (NIST) has revised the book on creating a comprehensive cybersecurity program that aims to help organizations of every size be more secure. Here's where to start putting the changes into action.

Millions of Malicious Repositories Flood GitHub
GitHub and cyberattackers are waging a quiet, automated war over malicious repos.

Tips on Managing Diverse Security Teams
The better a security team works together, the bigger the direct impact on how well it can protect the organization.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Microsoft Zero-Day Used by Lazarus in Rootkit Attack
North Korean state actors Lazarus Group used a Windows AppLocker zero-day, along with a new and improved rootkit, in a recent cyberattack, researchers report.
LATEST FROM THE EDGE

Name That Edge Toon: How Charming
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
LATEST FROM DR TECHNOLOGY

Cloud Apps Make the Case for Pen-Testing-as-a-Service
Applications are increasingly distributed, expanding companies' cloud attack surfaces and requiring regular testing to find and fix vulnerabilities — and avoid the risk of a growing sprawl of services.
LATEST FROM DR GLOBAL

GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia
Ransomware cybercrime gangs GhostSec and Stormous have teamed up in widespread double-extortion attacks.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.