Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Samsung Engineers Feed Sensitive Data to ChatGPT, Sparking Workplace AI Warnings

In three separate incidents, engineers at the Korean electronics giant reportedly shared sensitive corporate data with the AI-powered chatbot.

DARKReading
#mac#intel#perl#samsung
Renewed Focus on Incident Response Brings New Competitors and Partnerships

Microsoft and others are doubling down on incident response, adding services and integrating programs to make security analysts and incident response engagements more efficient.

Apps for Sale: Cybercriminals Sell Android Hacks for Up to $20K a Pop

The marketplace for malicious Google Play applications and app-takeover tools is thriving, thanks to novel hacking techniques and lax enterprise security.

Pair of Apple Zero-Days Under Active Exploit; Patch & Update Accordingly

Unpatched Macs, iPhones, and iPads open to browser takeover and system kernel-level malicious code execution, Apple warns.

High-Stakes Ransomware Response: Know What Cards You Hold

When ransomware strikes, how much should you gamble on your resources and opponents' intentions? Here's how to deal yourself a rational, informed way to weigh your options after an attack.

Russia's Joker DPR Claims Access to Ukraine Troop Movement Data

A hacktivist group working with Russia claims it breached DELTA, the Ukrainian battlefield management system (BMS).

How and Why to Put Multicloud to Work

Complex multicloud environments present organizations with security challenges, but also opportunities for efficiency.

Rethinking Cybersecurity's Structure & the Role of the Modern CISO

A CISO with a focused role will be better prepared to thrive in an organization and accelerate adoption and understanding of cybersecurity.

Almost Half of Former Employees Say Their Passwords Still Work

It's not hacking if organizations fail to terminate password access after employees leave.

Microsoft, Fortra & Health-ISAC Team Up to Remove Illicit Cobalt Strike Tools

The effort aims to disrupt the use of altered Cobalt Strike software by cybercriminals in ransomware and other attacks.