Follow Dark Reading:
 August 10, 2021
LATEST SECURITY NEWS & COMMENTARY
14 Vulnerabilities Found in Widely Used TCP/IP Stack
"Infra:Halt" Flaws in NicheStack impact potentially millions of devices used in OT and industrial control system environments, analysts say.
The Misunderstood Security Risks of Behavior Analytics, AI & ML
By separating the hype from reality, the risks of relying on AI and ML to identify security threats become clear.

Black Hat News

In case you missed Black Hat USA or just some of the Briefings, check out Dark Reading's comprehensive coverage.


(Sponsored Article) How Much Revenue Is at Stake Due to Insider Risk?

Unlocking speed and agility in the work-from-anywhere collaboration culture demands a better understanding of the growing insider risk to valuable data.


How Threat Analysts Learned from Attackers' OpSec Mistakes
In targeting executives at a COVID research firm, state-sponsored threat group ITG18 made some mistakes. Here's how IBM X-Force used that to their advantage.
You Gotta Fight for Your Right to Repair Your Robots
Good luck fixing the security vulnerability in that $100,000 piece of industrial robotics equipment. The industry’s practices of planned obsolescence and closed systems make repairs unlikely to happen (and security problems likely to remain).
New Android Malware Infects Thousands of Facebook Accounts
The FlyTrap Trojan has spread to more than 10,000 victims via social media hijacking, third-party app stores, and sideloaded applications.
Average Ransomware Payment Hits $570,000 in H1 2021
A new report finds ransomware gangs now bundle extortion methods to make victims pay up after an attack.

(Sponsored Video) Dark Reading News Desk Talks to Cisco Secure

Dive into passwordless technology and the good and bad of biometrics in this discussion with Cisco Secure's advisory CISO Wolf Goerlich.


(Sponsored Video) Dark Reading News Desk Talks to Cisco Talos

Ransomware (the other pandemic) is showing no signs of slowing down and in fact seems to be gaining momentum.


MORE NEWS & COMMENTARY
HOT TOPICS
Inside the 'Informal Economy' of Workers Supporting Cybercrime
Researchers trace the path users take from using online forums to chatting on cybercrime platforms, and what motivates them.

Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new research shows.

Average Cost to Buy Access to a Compromised Company: $1,000
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to specialize in particular stages of the attack-chain pipeline.

MORE
EDITORS' CHOICE

CISA Launches JCDC, the Joint Cyber Defense Collaborative
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA on Thursday.
In Attack Surface Management, It's What You Don't See That Can Sink You
To fully protect your organization, you need to go deep and discover the risky IT assets, networks, and environments you don't yet know about.
LATEST FROM THE EDGE

Security of Open Source Components Requires More Collaborative Efforts
While companies have expanded their use of open source, most are not giving back -- and the open source security continues to falter.
Tech Resources
ACCESS TECH LIBRARY NOW

  • External Threat Hunting - Reduce Supply Chain Risk

    In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ...

  • Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise

    Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.