Stuxnet was the first known malware built to attack operational technology environment. Since then, there have been several others.
Follow Dark Reading:
 April 21, 2022
LATEST SECURITY NEWS & COMMENTARY
6 Malware Tools Designed to Disrupt Industrial Control Systems (ICS)
Stuxnet was the first known malware built to attack operational technology environment. Since then, there have been several others.
Okta Wraps Up Lapsus$ Investigation, Pledges More Third-Party Controls
Companies must enforce more security on their own third-party providers and retain the ability to conduct independent investigations, experts say.
Denonia Malware Shows Evolving Cloud Threats
Cloud security is constantly evolving and consistently different than defending on-premises assets. Denonia, a recently discovered serverless cryptominer drives home the point.
How Russia Is Isolating Its Own Cybercriminals
Sanctions imposed by the Biden administration, coupled with Russia's proposed initiative to cut itself off from the global Internet, is causing cybercriminals to ponder their future.
From Passive Recovery to Active Readiness
This is the shift that companies need to make after a cyberattack.
LinkedIn Brand Now the Most Abused in Phishing Attempts
New research shows threat actors increasingly leveraging social networks for attacks, with LinkedIn being used in 52% of global phishing attacks.
CISA, Australia, Canada, New Zealand, & UK Issue Joint Advisory on Russian Cyber Threats
The Russian government is ratcheting up malicious cyberattacks against critical infrastructure in countries supporting Ukraine.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
More Than Half of Initial Infections in Cyberattacks Come Via Exploits, Supply Chain Compromises
Mandiant data also shows a dramatic drop in attacker dwell time on victim networks in the Asia-Pacific region — to 21 days in 2021 from 76 days in 2020.

Identifying a Vulnerability in the SAP Software Supply Chain
Make sure you're using the patch to block this supply chain attack.

The Misconceptions of 2021's Black Swan Cyber Events
Organizations can defend themselves from future unknows attacks by implementing targeted security hardening measures, turning on built-in security protections, and leveraging existing technology stack to achieve microsegmentation and credential hygiene.

MORE
EDITORS' CHOICE

Millions of Lenovo Laptops Contain Firmware-Level Vulnerabilities
Three flaws present in consumer laptops can give attackers a way to drop highly persistent malware capable of evading methods to remove it, security vendor says.
LATEST FROM THE EDGE

Backward-Compatible Post-Quantum Communications Is a Matter of National Security
When a quantum computer can decipher the asymmetric encryption protecting our vital systems, Q-Day will arrive.
LATEST FROM DR TECHNOLOGY

Anti-Fraud Partnership Brings Confidential Computing to Financial Services
Intel, FiVerity, and Fortanix team up to launch an AI-driven fraud detection platform into a confidential computing environment.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building an Effective Active Directory Security Strategy

    For cyber criminals, Microsoft's Active Directory is a treasure trove of user identity and system access. But while Active Directory is a potential attack vector, it can also play a crucial role in enterprise cyber defenses. In this webinar, experts ...

  • Understanding Cyber Attacks on Remote Workers

    Following the COVID-19 quarantines, companies made a massive shift to remote and home working - and created a new range of opportunities for cyber attackers. While early attacks focused on phishing and credential theft, today cyber criminals are compromising corporate ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.