Follow Dark Reading:
 December 17, 2020
LATEST SECURITY NEWS & COMMENTARY
18,000 Organizations Possibly Compromised in Massive Supply-Chain Cyberattack
Nation-state attackers used poisoned SolarWinds network management software updates to distribute malware; US government orders federal civilian agencies to immediately power down the technology.
FireEye Identifies Killswitch for SolarWinds Malware as Victims Scramble to Respond
White House National Security Council establishes unified group to coordinate response across federal agencies to the threat.
Medical Imaging Leaks Highlight Unhealthy Security Practices
More than 45 million unique images, such as X-rays and MRI scans, are accessible to anyone on the Internet, security firm says.
Attackers Leverage IMAP to Infiltrate Email Accounts
Researchers believe cybercriminals are using a tool dubbed Email Appender to directly connect with compromised email accounts via IMAP.
VPNs, MFA & the Realities of Remote Work
The work-from-home-era is accelerating cloud-native service adoption.
Penetration Testing: A Road Map for Improving Outcomes
As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.
Microsoft Warns of Powerful New Adware
The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.
MORE NEWS & COMMENTARY
HOT TOPICS
Patching Still Poses Problems for Industrial Controllers, Networking Devices
More than 90% of devices that run popular embedded operating systems remain vulnerable to critical flaws disclosed more than a year ago.

The Private Sector Needs a Cybersecurity Transformation
Cybersecurity must get to the point where it's equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away.

Why Secure Email Gateways Rewrite Links (and Why They Shouldn't)
Redirecting a user to a trusted server buys a secure email gateway company some time while it decides whether a URL is malicious -- but there are avoidable drawbacks to this approach.

MORE
EDITORS' CHOICE

7 Security Tips for Gamers
Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

Flash Poll: Ransomware Response

How confident are you in your organization's plan for responding to a ransomware attack?


LATEST FROM THE EDGE

2021 Security Budgets: Top Priorities, New Realities
An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies. What's on the horizon? They share with us their spending plans for 2021.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Robotic Processing Can Automate Your Business Processes

    Robotic process automation (RPA) is no longer confined to the domain of scientific research and advanced robotics - it's swiftly becoming a valuable enterprise technology platform for advancing business process automation. In this webinar, learn how to save time by ...

  • Security Alert Fatigue: Tips for Taking Control

    Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.