Follow Dark Reading:
 March 22, 2017
LATEST SECURITY NEWS & COMMENTARY
3,000 Industrial Plants Per Year Infected with Malware
Targeted industrial control systems-themed malware is less prevalent yet persistent, including one variant posing as Siemens PLC firmware that has been in action since 2013, researchers find.
Report: 'OilRig' Attacks Expanding Across Industries, Geographies
The highly-effective malware targets Middle Eastern airlines, government, financial industries and critical infrastructures with a simple but powerful backdoor created by infected Excel files attached to phishing emails.
The True State of DevSecOps
Automation improving, but security needs to find ways to slide into DevOps workflow and toolchain.
New Metasploit Extension Available for Testing IoT Device Security
RFTransceiver extension for the Metasploit Hardware Bridge API will let organizations detect and scan wireless devices operating outside 802.11 spec.
Cisco Issues Advisory on Flaw in Hundreds of Switches
Vulnerability was discovered in WikiLeaks' recent data dump on CIA's secret cyber-offensive unit.
Hacked Sites Up By 32% in 2016 Over 2015, Says Google
Webmasters should register on Search Console for hack notifications, advises the company.
MORE NEWS & COMMENTARY
HOT TOPICS
New Wave of Security Acquisitions Signals Start of Consolidation Trend
A dozen recent high-profile deals reflect cybersecurity vendors' hopes of expanding their offerings with next-generation technology, ideas, and talent.

Ethical Hacking: The Most Important Job No One Talks About
If your company doesn't have an ethical hacker on the security team, it's playing a one-sided game of defense against attackers.

The 6 Riskiest Social Media Habits to Avoid at Work
Cybercriminals are turning to Facebook Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk.

MORE
SECURITY LIVE AT INTEROP ITX

MAY 15-19, 2017, MGM GRAND, LAS VEGAS

Check out all the sessions in the Interop Security Track. And don't forget about the two-day Dark Reading Cybersecurity Summit -- a great "what you need to know now" refresher for the overworked infosec pro or security crash course for the IT generalists in your life.


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Malware Explained: Packer, Crypter & Protector
These three techniques can protect malware from analysis. Here's how they work.

7 Things You Need to Know about Bayesian Spam Filtering
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.

4 Ways to Recover from a Cyberattack
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.