Follow Dark Reading:
 July 01, 2019
LATEST SECURITY NEWS & COMMENTARY
6 Security Tips That'll Keep the Summer Fun
Taking some time off this summer? Before you head out on vacation, make sure your devices and apps are also ready.
MageCart Launches Customizable Campaign
A tool new to MageCart bolsters the group's ability to evade detection and steal data.
How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy
Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.
Key Biscayne Hit by Cybersecurity Attack
Key Biscayne is the third Florida town to be hit by hackers in June.
Cloud Provider PCM Suffers Data Breach
Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.
Black Hat USA's New Micro Summits Deliver Focused, Practical Security Insights
This year Black Hat USA is introducing special half-day programs focused on important topics that combine subject matter expertise with networking opportunities.
MORE NEWS & COMMENTARY
HOT TOPICS
Email Threats Continue to Grow as Attackers Evolve, Innovate
Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says.

Malware Coming to a Mac Near You? Yes, Say Security Firms
While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.

Office 365 Multifactor Authentication Done Right
Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves.

MORE
EDITORS' CHOICE

7 Ways to Mitigate Supply Chain Attacks
Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.
Understanding & Defending Against Polymorphic Attacks
Polymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here's why.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Thinking Like a Cyber Attacker: Strategies for Defense

    In this Dark Reading webinar, experts discuss methods for testing your security's mettle by thinking like your adversary.

  • Cybersecurity Automation 101

    Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.