Follow Dark Reading:
 June 16, 2017
LATEST SECURITY NEWS & COMMENTARY
1 Million Endpoints Exposed on Public Internet via Microsoft File-Sharing Services
Research on global Internet security posture found endpoints leaving Microsoft SMB file-sharing systems wide open online, a finding that explains the rapid spread of WannaCry, Rapid7 says.
NSA Reportedly Confident North Korea Was Behind WannaCry
But some say no evidence exists to unequivocally pin blame for attacks on Pyongyang.
Samsung KNOX Takes Some Knocks
Researcher at Black Hat USA will reveal Samsung KNOX 2.6 vulnerabilities and bypass techniques, and notes that new KNOX 2.8 may be at risk as well.
Trump's Executive Order: What It Means for US Cybersecurity
The provisions are all well and good, but it's hardly the first time they've been ordered by the White House.
Climbing the Security Maturity Ladder in Cloud
These five steps will insure that you achieve the broadest coverage for onboarding your most sensitive workloads.
Malware Incidents at US SMBs Spiked 165% in Q1
Texas-based SMBs suffered the most malware attack attempts in the first quarter while those in Arizona had the biggest year-over-year increase, according to new Malwarebytes report.
Most Organizations Not Satisfied with Threat Intelligence
Information Security Forum survey finds just one quarter of companies surveyed say threat intelligence technology is delivering on its promise.
MORE NEWS & COMMENTARY
HOT TOPICS
How End-User Devices Get Hacked: 8 Easy Ways
Security experts share the simplest and most effective methods bad guys employ to break into end-user devices.

New Attack Method Delivers Malware Via Mouse Hover
'Mouseover' technique relies on users hovering over hyperlinked text and images in Microsoft PowerPoint files to drop Trojan.

The Detection Trap: Improving Cybersecurity by Learning from the Secret Service
Intruders often understand the networks they target better than their defenders do.

MORE
EDITORS' CHOICE

The Rising Tide of Crimeware-as-a-Service
Malware, botnets, phishing and backdoors are all offered on the cheap as subscription. These days even crime is in the cloud.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Securing Your Endpoints from Ransomware & Other Trending Attacks

    Attackers have shifted their tactics. They've discovered new ways to re-engineer tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these sophisticated attacks, ...

  • Open Source: The Benefits & Challenges

    Open source technology is gaining ground throughout IT and especially in operating systems and databases. Open source software drives efficiency and innovation, but affects your application stacks and introduces new challenges to keeping them highly available and performing. Find out ...

MORE WEBINARS

Partner Perspectives

Cyber Insurance: Read the Fine Print!
Applying for insurance is a grueling process involving detailed questionnaires and lengthy technical interviews that can still leave you without an adequate safety net.

Ditch the Big Ass Spreadsheet with Continuous Security Compliance
Replacing outdated spreadsheets with automated, continuous monitoring reduces workload and increases reliability, making compliance easy.

Hide & Seek: Security Teams Lack Visibility in the Cloud
IT leaders remain on the hot seat when it comes to their ability to continuously monitor the state of their data and operations. How hot is your seat?

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.