Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

CISA: Threat Actor Breached Federal Systems via Adobe ColdFusion Flaw

Adobe patched CVE-2023-26360 in March amid active exploit activity targeting the flaw.

https://www.darkreading.com/cyberattacks-data-breaches/hreat-actor-breached-federal-agency-systems-via-adobe-coldfusion-flaw-cisa-says

Microsoft Is Getting a New 'Outsider' CISO

Igor Tsyganskiy inherits the high-profile CISO spot in Redmond, while his predecessor, Bret Arsenault, is named chief security adviser.

https://www.darkreading.com/cybersecurity-operations/microsoft-is-getting-new-ciso-in-new-year

US Navy Ship Builder Says No Classified Info Leaked in Cyberattack

Austul USA, a military contractor, alerts law enforcement it quickly mitigated a recent cyberattack on its systems and that an investigation is ongoing.

https://www.darkreading.com/cyberattacks-data-breaches/austal-usa-investigates-cyberattack-claimed-by-ransomware-group

Microsoft Is Getting a New 'Outsider' CISO

Igor Tsyganskiy inherits the high-profile CISO spot in Redmond, while his predecessor, Bret Arsenault, is named chief security advisor.

https://www.darkreading.com/cybersecurity-operations/microsoft-is-getting-a-new-ciso-in-the-new-year-

Vulns in Android WebView, Password Managers Can Leak User Credentials

Black Hat researchers show top password managers on Android mobiles are prone to leak passwords when using WebView autofill function.

https://www.darkreading.com/cyberattacks-data-breaches/android-vulnerability-leaks-credentials-from-password-managers-

UK Cyber CTO: Vendors' Security Failings Are Rampant

The NCSC's Ollie Whitehouse criticizes security vendors for actively working against organizations in their fight against breaches and ransomware.

https://www.darkreading.com/cyber-risk/uk-cyber-cto-vendors-security-failings-rampant

Critical Bluetooth Flaw Exposes Android, Apple & Linux Devices to Takeover

Various devices remain vulnerable to the bug, which has existed without notice for years and allows an attacker to control devices as if from a Bluetooth keyboard.

https://www.darkreading.com/vulnerabilities-threats/critical-bluetooth-flaw-exposes-android-apple-and-linux-devices-to-keystroke-injection-attack

Middle East CISOs Fear Disruptive Cloud Breach

Increasingly, businesses are concerned about the speed of their cloud incident response times.

https://www.darkreading.com/cloud-security/middle-east-cisos-fear-disruptive-cloud-breach

Cracking Weak Cryptography Before Quantum Computing Does

Worries over crypto's defenselessness against quantum computing has inspired a project that automates the discovery of insecure cryptographic algorithms in open source software.

https://www.darkreading.com/application-security/cracking-weak-cryptography-quantum-computing

What the FDA and ONC Have Said About AI in Healthcare

US government organizations responsible for making sure healthcare products are safe and effective have proposed rules and are soliciting industry feedback regarding artificial intelligence and machin...

https://www.darkreading.com/cyber-risk/what-the-fda-and-onc-have-said-about-ai-in-healthcare

Strategy, Harmony & Research: Triaging Priorities for OT Cybersecurity

Despite a focus on the future, there's no indication of how well the cybersecurity basics needed to stay safe are being applied.

https://www.darkreading.com/ics-ot-security/strategy-harmony-research-triaging-priorities-for-ot-cybersecurity

Internationalizing Efforts to Counter Tech Support Scams

Trusted relationships and global collaboration are essential to improve collective knowledge, drive resilience, and mitigate international security risks.

https://www.darkreading.com/cyber-risk/internationalizing-efforts-to-counter-tech-support-scams

LLMs Open to Manipulation Using Doctored Images, Audio

As LLMs begin to integrate multimodal capabilities, attackers could use hidden instructions in images and audio to get a chatbot to respond the way they want, say researchers at Black Hat Europe 2023.

https://www.darkreading.com/vulnerabilities-threats/llms-open-manipulation-using-doctored-images-audio

Apple 'Lockdown Mode' Bypass Subverts Key iPhone Security Feature

Even the most severe security protections for mobile phones aren't all-encompassing or foolproof, as a tactic involving a spoof of lockdown mode shows.

https://www.darkreading.com/endpoint-security/apple-lockdown-mode-bypass-subverts-iphone-strongest-security-feature

SpyLoan Malicious App Downloaded 12M+ Times in Google Play

The fake financial app tricks users into signing up for high-interest payments, only to steal their information and blackmail them.

https://www.darkreading.com/cyber-risk/spyloan-malicious-app-downloaded-over-12m-times-in-googleplay