Avatar
Dark Reading
f9e52ebe8a51b90fdaacc735e822d6ee358d91dad406768f80af646b7c85d797
Dark Reading: Connecting the Information and Security Community

New Tool Shields Organizations From NXDOMAIN Attacks

Akamai joins a growing list of security vendors aiming to strengthen DNS defenses.

https://www.darkreading.com/remote-workforce/akamai-boosts-dns

CISA's Malware Analysis Platform Could Foster Better Threat Intel

But just how the government differentiates its platform from similar private-sector options remains to be seen.

https://www.darkreading.com/vulnerabilities-threats/cisa-s-new-malware-analysis-platform-could-enable-better-threat-intelligence

CISO Corner: Securing the AI Supply Chain; AI-Powered Security Platforms; Fighting for Cyber Awareness

Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: facing hard truths in software security, and th...

https://www.darkreading.com/cybersecurity-operations/ciso-corner-securing-ai-supply-chain-ai-powered-security-platforms-cyber-awareness

CISA Issues Emergency Directive After Midnight Blizzard Microsoft Hits

Though Federal Civilian Executive Branch (FCEB) agencies are the primary targets, CISA encourages all organizations to up their security, given the high risk.

https://www.darkreading.com/cyberattacks-data-breaches/cisa-emergency-directive-after-midnight-blizzard-microsoft-hits

The Race for AI-Powered Security Platforms Heats Up

Microsoft, Google, and Simbian each offer generative AI systems that allow security operations teams to use natural language to automate cybersecurity tasks.

https://www.darkreading.com/cybersecurity-operations/race-ai-powered-platforms-security-platforms

Critical Infrastructure Security: Observations From the Front Lines

Attacks on critical infrastructure are ramping up — but organizations now have the knowledge and tools needed to defend against them.

https://www.darkreading.com/vulnerabilities-threats/critical-infrastructure-security-observations-from-front-lines

Knostic Brings Access Control to LLMs

Led by industry veterans Gadi Evron and Sounil Yu, the new company lets organizations adjust how much information LLMs provide based on the user's role and responsibilities.

https://www.darkreading.com/data-privacy/knostic-brings-access-control-to-llms

DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse

North Korean hackers break ground with new exploitation techniques for Windows and macOS.

https://www.darkreading.com/vulnerabilities-threats/dprk-exploits-mitre-sub-techniques-phantom-dll-hijacking-tcc-abuse

Sisense Password Breach Triggers 'Ominous' CISA Warning

With stores of mega-corporate business intelligence, a Sisense compromise could potentially mushroom into supply chain cyberattack disaster, experts fear.

https://www.darkreading.com/threat-intelligence/sisense-breach-triggers-cisa-password-reset-advisory

DPRK Exploits 2 New MITRE Techniques: Phantom DLL Hijacking, TCC Abuse

North Korean hackers break ground with new exploitation techniques for Windows and macOS.

https://www.darkreading.com/vulnerabilities-threats/dprk-exploits-new-mitre-techniques-phantom-dll-hijacking-tcc-abuse

Critical Rust Flaw Poses Exploit Threat in Specific Windows Use Cases

Project behind the Rust programming language asserted that any calls to a specific API would be made safe, even with unsafe inputs, but researchers found ways to circumvent the protections.

https://www.darkreading.com/application-security/critical-rust-flaw-poses-exploit-threat-in-specific-windows-use-cases

Apple Warns Users in 150 Countries of Mercenary Spyware Attacks

In new threat notification information, Apple singled out Pegasus vendor NSO Group as a culprit in mercenary spyware attacks.

https://www.darkreading.com/vulnerabilities-threats/apple-warns-users-targeted-by-mercenary-spyware

Expired Redis Service Abused to Use Metasploit Meterpreter Maliciously

Attackers have compromised an 8-year-old version of the cloud platform to distribute various malware that can take over infected systems.

https://www.darkreading.com/cloud-security/outdated-redis-service-abused-to-spread-meterpreter-backdoor

Why MLBOMs Are Useful for Securing the AI/ML Supply Chain

A machine learning bill of materials (MLBOM) framework can bring transparency, auditability, control, and forensic insight into AI and ML supply chains.

https://www.darkreading.com/vulnerabilities-threats/mlboms-are-useful-for-securing-ai-ml-supply-chain

Zambia Busts 77 People in China-Backed Cybercrime Operation

Phony call center company conducted online fraud and other Internet scams.

https://www.darkreading.com/endpoint-security/zambia-busts-77-in-china-backed-cybercrime-operation

Japan, Philippines, & US Forge Cyber Threat Intel-Sharing Alliance

Following the Volt Typhoon attacks on critical infrastructure in the region by China, the US reportedly will share cybersecurity threat information with both countries.

https://www.darkreading.com/cybersecurity-operations/japan-philippines-us-forge-cyber-threat-intelligence-sharing-alliance

XZ Utils Scare Exposes Hard Truths About Software Security

Much of the open source code embedded in enterprise software stacks comes from small, under-resourced, volunteer-run projects.

https://www.darkreading.com/application-security/xz-utils-scare-exposes-hard-truths-in-software-security