North Korea successfully hacks email of South Korean President’s aide, gains access to sensitive information
The office of South Korean president Yoon Suk Yeol has confirmed that it believes North Korea hacked into the emails of one of its staff members. The hack of an unidentified member of the presidential staff’s personal email account occurred in the run-up to a three-day visit to Europe in November, where Yoon met British […]
New Google Chrome feature blocks attacks against home networks
Google is testing a new feature to prevent malicious public websites from pivoting through a user’s browser to attack devices and services on internal, private networks. More simply, Google plans to prevent bad websites on the internet from attacking a visitor’s devices (like printers or routers) in your home or on your computer. People usually […]
Google Open Sources Magika: AI-Powered File Identification Tool
Feb 17, 2024NewsroomArtificial Intelligence / Data Protection Google has announced that it’s open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary and textual file types. “Magika outperforms conventional file identification methods providing an overall 30% accuracy boost and up to 95% higher precision on traditionally hard to […]
CIO Convergence, 10 Critical Security Metrics, & Ivanti Fallout
Welcome to CISO Corner, Dark Reading’s weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we’ll offer articles gleaned from across our news operation, The Edge, DR Technology, DR Global, and our Commentary section. We’re committed to bringing you a diverse set of perspectives to support the job of […]
U.S. Internet Leaked Years of Internal, Customer Emails – Krebs on Security
The Minnesota-based Internet provider U.S. Internet Corp. has a business unit called Securence, which specializes in providing filtered, secure email services to businesses, educational institutions and government agencies worldwide. But until it was notified last week, U.S. Internet was publishing more than a decade’s worth of its internal email — and that of thousands of […]
Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe
Video Here’s how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals 16 Feb 2024 Cyber-insurance has been an increasingly hot topic lately, with the cyber-insurance industry growing of 62 percent last year, which largely appears to be attributable to […]
OpenAI’s Sora Generates Photorealistic Videos
OpenAI released on Feb. 15 an impressive new text-to-video model called Sora that can create photorealistic or cartoony moving images from natural language text prompts. Sora isn’t available to the public yet; instead, OpenAI released Sora to red teamers — security researchers who mimic techniques used by threat actors — to assess possible harms or […]