Follow Dark Reading:
 September 24, 2021
LATEST SECURITY NEWS & COMMENTARY
6 Lessons From Major Data Breaches This Year
Though many incidents stemmed from familiar security failures, they served up — or resurfaced — some important takeaways.
Google Spots New Technique to Sneak Malware Past Detection Tools
The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.
FamousSparrow APT Group Flocks to Hotels, Governments, Businesses
The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.
How to Implement a Security Champions Program
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top of mind throughout the business.
NIST Brings Threat Modeling into the Spotlight
NIST recommendations typically become part of government procurement, which means threat modeling will soon be written into questions for organizations that sell to the federal government.
Apple Patches Zero-Days in iOS, Known Vuln in macOS
One of the iOS vulnerabilities was discovered by Citizen Lab; the Google Threat Analysis Group reported iOS and macOS flaws.

Microsoft Exchange Autodiscover Flaw Leaks Thousands of Credentials

Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol.


MORE NEWS / MORE COMMENTARY
HOT TOPICS
Password Reuse Problems Persist Despite Known Risks
The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a variation, a survey finds.

Midmarket Security: Think You’re Safe? Think Again
Gone is the false perception that large enterprises, banks, and financial institutions are the only organizations under attack.

Why Security Pros Should Rethink Their Focus on Information Resilience
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's ability to return to a prior state doesn't mean it's sufficiently resilient.

MORE
EDITORS' CHOICE

Who Is BlackMatter?
Researchers piece together the origins of the group that made headlines this week as the perpetrator behind a ransomware attack on New Cooperative.
LATEST FROM THE EDGE

Primer: Microsoft Active Directory Security for AD Admins
Nearly all AD environments are vulnerable to identity attack paths -- a powerful, widespread, and difficult-to-detect attack technique. But we didn't say impossible. Here's how admins can stop them.
10 Ways to Avoid Zero-Trust Failure
Here are the prerequisites to have in order before getting past the zero-trust gate.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Learn Why XDR Delivers Better Outcomes to Secure Your Endpoints

    Endpoint security continues to evolve. The increasing complexity of the threat landscape means we can no longer depend on next-gen antivirus (NGAV) or EDR (Endpoint Detection and Response) alone to protect against sophisticated attacks. It's well known that endpoint attacks ...

  • Ten Hot Talks from Black Hat 2021

    The annual Black Hat USA 2021 in Las Vegas featured a full slate of cybersecurity researchers presenting. They offered up discoveries about new critical security vulnerabilities, new threats, and new security tools that enterprise defenders need to know about as they ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.