Judge dismisses claims against SolarWinds for actions taken after its systems had been breached, but allows the case to proceed for alleged misstatements prior to the incident. [TechWeb]( Follow Dark Reading:
[RSS](
July 19, 2024 LATEST SECURITY NEWS & COMMENTARY [Sizable Chunk of SEC Charges Against SolarWinds Tossed Out of Court](
Judge dismisses claims against SolarWinds for actions taken after its systems had been breached, but allows the case to proceed for alleged misstatements prior to the incident.
[20 Million Trusted Domains Vulnerable to Email Hosting Exploits](
Three newly discovered SMTP smuggling attack techniques can exploit misconfigurations and design decisions made by at least 50 email-hosting providers.
[Iranian Cyber-Threat Group Drops New Backdoor, 'BugSleep'](
The group â which has targeted Israel, Saudi Arabia, and other nations â often uses spear-phishing and legitimate remote management tools but is developing a brand-new homegrown tool set.
[Microsoft-Signed Chinese Adware Opens the Door to Kernel Privileges](
An official stamp of approval might give the impression that a purported "HotPage" adtech tool is not, in fact, a dangerous kernel-level malware â but that's just subterfuge.
[AI Remains a Wild Card in the War Against Disinformation](
Digital literacy and protective measures will be key to detecting disinformation and deepfakes as AI is used to shape public opinion and erode trust in the democratic processes, as well as identify nefarious content.
[High-Severity Cisco Bug Grants Attackers Password Access](
The vulnerability was given the highest CVSS score possible, though few details have been released due to its severity.
[US Data Breach Victim Numbers Increase by 1,000%, Literally](
Though the number of victims has risen, the actual number of breaches has gone down, as fewer, bigger breaches affect more individuals.
[(Sponsored Article) GenAI-Powered Attacks Change the Game](
While GenAI tools increase the speed at which employees and organizations can operate, they also afford adversaries the same luxury. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [Threat Actors Ramp Up Use of Encoded URLs to Bypass Secure Email]( The tactic is not new, but there has been a steady increase in its use as of this spring.
['BadPack' APK Files Make Android Malware Hard to Detect]( Manipulated header info within files, in mobile Trojans like TeaBot and others, makes it difficult for defenders to analyze and detect them.
[Training at Black Hat to Focus on Equipping Cybersecurity Leaders With Soft Skills]( A two-day presentation will examine the social-behavioral aspects of cybersecurity leadership to drive team success.
[Snowflake Account Attacks Driven by Exposed Legitimate Credentials]( Credential management gets a boost with the latest infostealers' extortion campaign built on info stolen from cloud storage systems. [MORE]( PRODUCTS & RELEASES [Aura Partners With Mosaic Compliance Services to Launch a Program to Protect Auto Dealers and Buyers From Cybercrime]( [QBE Insurance Launches Global Cyber Coverage With QCyberProtect]( [Top 5 Mistakes Businesses Make When Implementing Zero Trust]( [Tumeryk Inc. Launches With Free Gen AI LLM Vulnerability Scanner](
[MORE PRODUCTS & RELEASES]( EDITORS' CHOICE [Orgs Are Finally Making Moves to Mitigate GenAI Risks](
With AI use ramping up rapidly, a growing number of enterprise security teams have begun putting controls in place to protect sensitive data from accidental exposure and leaks. LATEST FROM THE EDGE [CSA Updates Cloud Security Certificate, Training](
Latest version of CSAâs Cloud Security Knowledge Certificate provides a comprehensive catalog of the essential skills cybersecurity professionals need to master. LATEST FROM DR TECHNOLOGY [CISA Publishes Resiliency Playbook for Critical Infrastructure](
The manual provides guidance on how to improve the resiliency of critical infrastructure. LATEST FROM DR GLOBAL [West African Crime Syndicate Taken Down by Interpol Operation](
Law enforcement managed to arrest numerous members of Black Axe, a notorious group engaged in a wide variety of criminal activity. WEBINARS - [Search Capabilities with PostgreSQL: From Standard to Semantic]( In the digital age, the ability to sift through vast amounts of text data efficiently and effectively is crucial. PostgreSQL, a robust open-source relational database, offers various search functionalities that cater to multiple needs, from simple pattern matching to linguistic ... - [Enhance Cloud Security with Cloud-Native Security]( In this webinar, learn how your current cloud security measures may be falling short as you shift to cloud-native, and what new tools and processes you will need to put in place to stay ahead of attackers. [View More Dark Reading Webinars >>]( WHITE PAPERS - [OT Cybersecurity Glossary & Quick Start Guide](
- [IT Risk & Compliance Platforms: A Buyer's Guide](
- [Threat Hunting's Evolution:From On-Premises to the Cloud](
- [Continuous Asset Discovery Do and Don'ts](
- [The Forrester Waveâ¢: External Threat Intelligence Service Providers, Q3 2023](
- [Google Cloud Threat Horizons Report, H1 2024](
- [Generative AI Gifts]( [View More White Papers >>]( FEATURED REPORTS - [2024 InformationWeek US IT Salary Report]( [View More Dark Reading Reports >>]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=124691&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Daily_07.19.24&sp_cid=54375&utm_content=DR_NL_Dark%20Reading%20Daily_07.19.24&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#56
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2024]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)