Follow Dark Reading:
 October 04, 2021
LATEST SECURITY NEWS & COMMENTARY
Companies Face Issues as Let's Encrypt Root Certificate Expires
Experts warn devices will be affected after major HTTPS certificate provider Let's Encrypt saw its root certificate expire this week.
More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic
Analysis of threat trends from last quarter reveals attackers ramped up their use of fileless malware, and zero-day malware accounted for almost two-thirds of all detections.
FireEye Products & McAfee Enterprise Merge to Create $2B Entity
The combined company will have 5,000 employees, more than 40,000 customers, and nearly $2 billion in revenue, officials report.
The New Security Basics: 10 Most Common Defensive Actions
Companies now commonly collect security metrics from their software development life cycle, implement basic security measures, and define their obligations to protect user data as part of a basic security strategy.
It's Time to Rethink Identity and Authentication
The concept of identity has been around for decades, yet authentication has not caught up to its advanced threats until now. Here are four ways to begin thinking differently about identity and authentication.
5 Ways to Become a Better Cyber-Threat Exterminator
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and improve incident response times.
You're Going to Be the Victim of a Ransomware Attack
That's not admitting defeat. It's preparing for success.
4.6M Neiman Marcus Online Customers Alerted to Data Breach
The breach occurred in May 2020.
Akamai Acquires Guardicore in $600M Deal
In other acquisition news today, Arctic Wolf announced it will acquire Habitu8, a managed security awareness platform, for an undisclosed amount.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
7 Ways to Thwart Malicious Insiders
Malicious insider incidents may be less frequent than inadvertent user missteps, but they can cost organizations big time.

Notorious Spyware Tool Found Hiding Beneath Four Layers of Obfuscation
FinFisher (aka FinSpy) surveillance software now goes to extreme lengths to duck analysis and discovery, researchers found in a months-long investigation.

Modern Security Breaches Demand Diligent Planning and Executive Support
Teams that remain reactive will always be on the back foot — take an active stance.

MORE
LATEST FROM THE EDGE

10 Recent Examples of How Insider Threats Can Cause Big Breaches and Damage
Theft of intellectual property, sabotage, exposure of sensitive data and more were caused by malicious behavior and negligence at these organizations
Why Windows Print Spooler Remains a Big Attack Target
Despite countless vulnerabilities and exploits, the legacy Windows printing process service continues to be an attack surface in constant need of repair and maintenance, security experts say.
LATEST FROM DR TECHNOLOGY

Enterprises Planning SecOps Technology Deployments
With the easing of pandemic-related restrictions, enterprise defenders report they are investigating security operations technology to manage new risks that emerged over the past year.
EDITORS' CHOICE

75K Email Inboxes Hit in New Credential Phishing Campaign
Attacker used a legitimate — but likely deprecated — domain to sneak malicious emails past security filters, vendor says.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Defense Strategies to Combat Sophisticated Ransomware and Multi-Vector Attacks

    To defend themselves effectively, companies need to detect ransomware attacks early, gather the intelligence to understand the attack and prevent attacks from occurring in the future. In this webinar, Shailesh Athalye, EVP Product Management will discuss ransomware trends, defensive maneuvers ...

  • Learn Why XDR Delivers Better Outcomes to Secure Your Endpoints

    Endpoint security continues to evolve. The increasing complexity of the threat landscape means we can no longer depend on next-gen antivirus (NGAV) or EDR (Endpoint Detection and Response) alone to protect against sophisticated attacks. It's well known that endpoint attacks ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.