The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base. [TechWeb]( Follow Dark Reading:
[RSS](
August 03, 2023 LATEST SECURITY NEWS & COMMENTARY ['DarkBERT' GPT-Based Malware Trains Up on the Entire Dark Web](
The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base.
[China's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure](
US officials are concerned that the Beijing-directed cyberattacks could be a precursor to military disruption and broader destructive attacks on citizens and businesses.
[Tesla Jailbreak Unlocks Theft of In-Car Paid Features](
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.
[Apple Users Open to Remote Control via Tricky macOS Malware](
The Hidden Virtual Network Computing (hVNC) malware infests Macs and silently executes complete takeovers, with no user permission needed. It also sports persistence through reboots.
[CISA: 'Submarine' Backdoor Torpedoes Barracuda Email Security](
A China-nexus cyber-espionage campaign rages on with the fourth backdoor to surface in the wild that takes advantage of the CVE-2023-2868 zero-day security bug â with severe threat of lateral movement, CISA warns.
[Iran's APT34 Hits UAE With Supply Chain Attack](
The prolific APT, also known as OilRig, was caught targeting an IT company's government clients in the region, with the aim of carrying out cyber espionage.
[Another AI Pitfall: Digital Mirroring Opens New Cyberattack Vector](
The more artificial intelligence builds out our digital personas, the easier it will become for bad actors to target us with more convincing attacks.
[CherryBlos Malware Uses OCR to Pluck Android Users' Cryptocurrency](
The malware, along with a sister strain dubbed "FakeTrade," was found lurking in Google Play.
[Ubuntu Linux Cloud Workloads Face Rampant Root Take Takeovers](
Some 40% of Ubuntu Linux cloud workloads subject to GameOverlay security bugs in the OverlayFS module.
[Abyss Locker Ransomware Looks to Drown VMware's ESXi Servers](
The 4-month-old ransomware gang is now actively targeting VMware's virtual environments with a second variant of its custom malware.
[Air-Gapped ICS Systems Targeted by Sophisticated Malware](
Researchers uncovered new worming second-stage tools used to locally exfiltrate data from air gapped ICS environments, putting threat actors one step away from transmission of the info to a C2.
[Why the California Delete Act Matters](
Bill 362 is a perfect template for a nationwide win against data brokers and the privacy infringements they cause.
[What Will CISA's Secure Software Development Attestation Form Mean?](
The proposed attestation form is meant to help secure the software chain and formalizes the role of the SBOM as the first line of defense.
[Why Today's CISOs Must Embrace Change](
With change happening faster than ever before, tools can help bridge capability gaps, along with accelerated workforce training. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [Canon Inkjet Printers at Risk for Third-Party Compromise via Wi-Fi]( Nearly 200 models are affected by vulnerability that may give wireless access to unauthorized third parties.
[IT Ops and Security Teams Need Automation, Not Couples Therapy]( When their roles intersect, IT ops and security teams often find themselves at odds. Here are some ways to foster collaboration.
[Lessons Not Learned From Software Supply Chain Attacks]( Businesses that develop business-, mission-, or safety-critical software must learn from previous victims of software supply chain attacks. [MORE]( EDITORS' CHOICE [Summer Documentary Watch Party: 8 Sizzling Cybersecurity Tales](
From the upcoming Billion Dollar Heist to docs on the Ashley Madison breach and Stuxnet, here are a bevy of films that can scratch that wanna-be hacker itch. LATEST FROM THE EDGE [Protecting Intellectual Property When It Needs to Be Shared](
Companies should use a variety of tools and strategies, both technical and policy, to protect their IP from third-party risk. LATEST FROM DR TECHNOLOGY [BloodHound Rewrites Open Source Tool, Launches Community Edition](
The open source ecosystem for offensive and defensive security technologies is flourishing, giving security teams access to a wide range of tools to do their jobs. LATEST FROM DR GLOBAL [Website of Israeli Oil Refinery Taken Offline by Pro-Iranian Attackers](
The apparent pro-Iranian Cyber Avengers posted images of BAZAN Groups's SCADA systems, diagrams, and programmable logic controller (PLC) code. WEBINARS - [Protecting the Database: How to Secure Your Enterprise Data]( For many enterprises, the "crown jewels" are found in their database applications - virtual "crown jewels" of data in traditional database applications that are often linked to the Internet. What are the chief threats to today's databases? How can you ... - [Where and When Automation Makes Sense For Enterprise Cybersecurity]( A shortage of skilled IT security professionals has made it tempting to try to automate everything. But security teams have to be able to determine which tasks are safe to automate. How does emerging automation technology work, and how can ... [View More Dark Reading Webinars >>]( WHITE PAPERS - [9 Traits You Need to Succeed as a Cybersecurity Leader](
- [The Ultimate Guide to the CISSP](
- [Rediscovering Your Identity](
- [2023 Global Future of Cyber Report](
- [Cybersecurity in a post pandemic world: A focus on financial services](
- [Cybersecurity in 2023 and beyond: 12 leaders share their forecasts](
- [Know your customer: Enable a 360-degree view with customer identity & access management]( [View More White Papers >>]( FEATURED REPORTS - [How to Use Threat Intelligence to Mitigate Third-Party Risk]( The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ... - [Everything You Need to Know About DNS Attacks](
- [Successfully Managing Identity in Modern Cloud and Hybrid Environments]( Cloud promised to simplify the security and management of enterprise systems. In many ways it has, but when it comes to identity management it's as complicated as ever. This report details how to get identity programs on track -- and ... [View More Dark Reading Reports >>]( PRODUCTS & RELEASES [Solvo Unveils SecurityGenie: A Revolutionary ChatGPT-Like Solution for Cloud Security Teams]( [Tanium Selected by DHS CISA to Join the Joint Cyber Defense Collaborative]( [VALIC Retirement Services Company Experiences PBI Data Breach Exposing Approximately 798,000 Social Security Numbers]( [BeyondTrust's Identity Security Insights Provides Unprecedented Visibility into Identity Threats]( [Global Optical Sensor Market to Reach $45.56B by 2030, Rising Demand in Consumer Electronics and IoT Applications]( [Guardio Uncovers Zero-Day Vulnerability in Salesforce's Email Services](
[MORE PRODUCTS & RELEASES]( CURRENT ISSUE
[How to Use Threat Intelligence to Mitigate Third-Party Risk](
[DOWNLOAD THIS ISSUE](
[VIEW BACK ISSUES]( Dark Reading Weekly
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=117589&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Weekly_08.03.23&sp_cid=49393&utm_content=DR_NL_Dark%20Reading%20Weekly_08.03.23&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#78
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2023]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)