Follow Dark Reading:
 February 17, 2018
LATEST SECURITY NEWS & COMMENTARY
13 Russians Indicted for Massive Operation to Sway US Election
Russian nationals reportedly used stolen American identities and infrastructure to influence the 2016 election outcome.
Russian Hackers Sentenced in Heartland Payment Systems Breach Case
Two more men involved in the massive payment card theft from multiple major US corporations that began in 2007 now sent to federal prison.
Siemens Leads Launch of Global Cybersecurity Initiative
The new 'Charter of Trust' aims to make security a key element of the digital economy, critical infrastructure.
Rise of the 'Hivenet': Botnets That Think for Themselves
These intelligent botnet clusters swarm compromised devices to identify and assault different attack vectors all at once.
FedEx Customer Data Exposed on Unsecured S3 Server
Thousands of documents from US and international citizens were exposed on an Amazon S3 bucket configured for public access.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Nation-State Hacking Groups to Watch in 2018
The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.

Fileless Malware: Not Just a Threat, but a Super-Threat
Exploits are getting more sophisticated by the day, and cybersecurity technology just isn't keeping up.

One in Three SOC Analysts Now Job-Hunting
The more experienced a SOC analyst gets, the more his or her job satisfaction declines, a new survey of security operations center staffers shows.

MORE
EDITORS' PICKS

Encrypted Attacks Continue to Dog Perimeter Defenses
Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.
Democracy & DevOps: What Is the Proper Role for Security?
Security experts need a front-row seat in the application development process but not at the expense of the business.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Security Strategy Session] Improving Enterprise App Security

    Hear from experts on application security and the DevOps movement discuss the steps that enterprises can take to build security into the app development process.

  • Making Data Governance Really Work

    In this webinar, you'll learn how organizations such as yours can enable data governance programs, including how to overcome barriers to success. We'll offer recommendations on the measures you can take to fast-track your data governance program, whether you're just ...

MORE WEBINARS

Partner Perspectives

The Mirai Botnet Is Attacking Again...
And the spinoff bots - and all their command and control hostnames buried in the morass of digital data - are hilarious.

The GDPR Clock Is Running Out. Now What?
Many organizations impacted by new European Union data privacy rules that go into effect May 25 are still blind to some of the basics.

BrickerBot: Internet Vigilantism Ends Don't Justify the Means
However noble the intention, obtaining unauthorized access to devices and making them unusable is illegal and undermines the work of ethical researchers.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.