Follow Dark Reading:
 August 15, 2019
LATEST SECURITY NEWS & COMMENTARY
7 Biggest Cloud Security Blind Spots
Cloud computing boon is for innovation, yet security organizations find themselves running into obstacles.
Financial Phishing Grows in Volume and Sophistication in First Half of 2019
Criminals are using the tools intended to protect consumers to attack them through techniques that are becoming more successful with each passing month.
GitHub Named in Capital One Breach Lawsuit
A new lawsuit says that GitHub bears responsibility for the Capital One breach because it actively encourages hacking and stored stolen data.
Attackers Try to Evade Defenses with Smaller DDoS Floods, Probes
Cybercriminals are initiating more attacks using low-bandwidth techniques, but the tactics expand the gray area between DDoS attacks and popular methods of mass scanning.
BioStar 2 Leak Exposes 23GB Data, 1M Fingerprints
Thousands of organizations, including banks, governments, and the UK Metropolitan Police, use the biometric security tool to authenticate users.
Trend Micro Patches Privilege Escalation Bug in its Password Manager
Organizations should update to latest build as soon as possible, security vendor says.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Similar to the now-patched 'BlueKeep' vulnerability, two flaws fixed today could let malware spread across vulnerable computers.

Why Companies Fail to Learn from Peers' Mistakes (and How They Can Change)
Far too often, there's a new breach in the headlines. Companies need to start learning some obvious lessons.

Apple's New Bounty Program Has Huge Incentives, Big Risks
Industry observers applaud the program's ability to find exploits but fear unintended consequences.

MORE
EDITOR'S CHOICE

Stronger Defenses Force Cybercriminals to Rethink Strategy
Researchers see the rise of new relationships and attack techniques as criminals put companies' resilience to the test.
NEW FROM THE EDGE

5 Things to Know About Cyber Insurance
More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • State of the Cloud

    This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies ...

  • 2019 State of IT Infrastructure

    This report examines the current state of enterprise data center, storage and network infrastructure, explores how it is evolving, and looks into future plans for implementation. Read the Report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Kaspersky Research Finds Cloud Atlas APT Upgraded with Polymorphic Malware
McAfee to Acquire NanoSec to Enhance Capabilities in Cloud Security
NanoSec's multi-cloud, zero-trust application visibility and security platform further extend McAfee's cloud access security broker (CASB) and cloud workload protection platform (CWPP) capabilities.
ZeroFOX Expands AI Capabilities to Detect Deepfakes
New video analysis features analyze content and identify risks.
Capsule8 Adds Significant Funding from Intel Capital
Strategic investment to fuel expansion of Capsule8's go-to-market efforts.
MORE PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.