Follow Dark Reading:
 October 08, 2020
LATEST SECURITY NEWS & COMMENTARY
3 Ways Companies are Working on Security by Design
Execs from top financial organizations and other companies share insights on building a security culture.
Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats
Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.
'Bahamut' Threat Group Targets Government & Industry in Middle East
Researchers say the cyber espionage group was involved in several attacks against government officials and businesses in the Middle East and South Asia.
Rare Firmware Rootkit Discovered Targeting Diplomats, NGOs
Second-ever sighting of a firmware exploit in the wild is a grim reminder of the dangers of these mostly invisible attacks.
What the Sci-Fi Hit Altered Carbon Teaches Us About Virtualization Security
The Netflix show may be fantastical, but it has real-world lessons about virtualization.
New 'HEH' Botnet Targets Exposed Telnet Services
Latest threat is one in a growing list of malware developed in the Go programming language.
CISA Warns of Renewed Emotet Activity
The Emotet malware dropper is seeing an upsurge in new activity in the second half of 2020.
MORE NEWS & COMMENTARY
HOT TOPICS
Meet 'Egregor,' a New Ransomware Family to Watch
Egregor's operators promise to decrypt victims' files and provide security recommendations in exchange for ransom payment.

New Research Finds Bugs in Every Anti-Malware Product Tested
Products from every vendor had issues that allowed attackers to elevate privileges on a system -- if they already were on it.

A Guide to the NIST Cybersecurity Framework
With cybersecurity threats growing exponentially, it has never been more important to put together an efficient cyber-risk management policy, and NIST's framework can help.

MORE
EDITORS' CHOICE

6 Best Practices for Using Open Source Software Safely
Open source software is critical yet potentially dangerous. Here are ways to minimize the risk.
The New War Room: Cybersecurity in the Modern Era
The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.
NEW FROM THE EDGE

Open Source Threat Intelligence Searches for Sustainable Communities
As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.