Follow Dark Reading:
 December 11, 2018
LATEST SECURITY NEWS & COMMENTARY
6 CISO Resolutions for 2019
The ultimate to-do list for ambitious security leaders.
Satan Ransomware Variant Exploits 10 Server-Side Flaws
Windows, Linux systems vulnerable to self-propagating 'Lucky' malware, security researchers say.
6 Cloud Security Predictions for 2019
How the fast pace of cloud computing adoption in 2018 will dramatically change the security landscape next year.
DanaBot Malware Adds Spam to its Menu
A new generation of modular malware increases its value to criminals.
'Highly Active' Seedworm Group Hits IT Services, Governments
Since September, the cyber espionage actors have targeted more than 130 victims in 30 organizations including NGOs, oil and gas, and telecom businesses.
'Dr. Shifro' Prescribes Fake Ransomware Cure
A Russian firm aims to capitalize on ransomware victims' desperation by offering to unlock files then passing money to attackers.
New Google+ Breach Will Lead to Early Service Shutdown
A breach affecting more than 52 million users was patched, but not before leading to the company rethinking the future of the service.
MORE NEWS & COMMENTARY
HOT TOPICS
Toyota Builds Open-Source Car-Hacking Tool
'PASTA' testing platform specs will be shared via open-source.

'PowerSnitch' Hacks Androids via Power Banks
Researcher demonstrates how attackers could steal data from smartphones while they're charging.

5 Emerging Trends in Cybercrime
Organizations can start today to protect against 2019's threats. Look out for crooks using AI "fuzzing" techniques, machine learning, and swarms.

MORE
EDITORS' CHOICE

7 Common Breach Disclosure Mistakes
How you report a data breach can have a big impact on its fallout.
4 Lessons Die Hard Teaches About Combating Cyber Villains
With proper planning, modern approaches, and tools, we can all be heroes in the epic battle against the cyber threat.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.