Generative Data Intelligence

Tag: malicious code

Thousands of Australian Businesses Targeted With RAT

More than 11,000 Australian companies were targeted in a recent wave of cyberattacks that rely on an aging but still dangerous malware strain dubbed...

Top News

‘PhantomBlu’ Cyberattackers Backdoor Microsoft Office Users via OLE

A malicious email campaign is targeting hundreds of Microsoft Office users in US-based organizations to deliver a remote access trojan (RAT) that evades detection,...

In the rush to build AI apps, don’t leave security behind

Feature While in a rush to understand, build, and ship AI products, developers and data scientists are being urged to be mindful of security...

Is Your Business Ready for New Security Measure Integration?

New physical and digital threats seem to appear constantly. While most businesses respond by adopting the latest tools and technologies, not all of them...

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure What cyberthreats could wreak havoc on elections this year and how...

Japan Blames North Korea for PyPI Supply Chain Cyberattack

Japanese cybersecurity officials warned that North Korea's infamous Lazarus Group hacking team recently waged a supply chain attack targeting the PyPI software repository for...

CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...

How to Ensure Open Source Packages Are Not Landmines

Open source repositories are critical to running and writing modern applications, but beware — carelessness could detonate mines and inject backdoors and vulnerabilities in...

How to Ensure Open Source Packages Are Not Landmines

Open source repositories are critical to running and writing modern applications, but beware — carelessness could detonate mines and inject backdoors and vulnerabilities in...

JetBrains TeamCity Mass Exploitation Underway, Rogue Accounts Thrive

Attacks targeting two security vulnerabilities in the TeamCity CI/CD platform have begun in earnest just days after its developer, JetBrains, disclosed the flaws on...

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans through a targeted watering hole (also known as...

Over 100 Malicious Code-Execution Models on Hugging Face

Researchers have unearthed over 100 malicious machine learning (ML) models on the Hugging Face AI platform that can enable attackers to inject malicious code...

CISO Corner: Operationalizing NIST CSF 2.0; AI Models Run Amok

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?