Follow Dark Reading:
 June 15, 2020
LATEST SECURITY NEWS & COMMENTARY
7 Must-Haves for a Rockin' Red Team
Follow these tips for running red-team exercises that will deliver added insight into your operations.
15 Individuals Plead Guilty to Multimillion-Dollar Online Auction Fraud Scheme
Members of Romanian gang used fraudulent ads for nonexistent products to extract money from US Internet users, DoJ says.
Building Security into Software
Part 1 of a two-part series about securing machine learning.
The Future Will Be Both Agile and Hardened
What COVID-19 has taught us about the digital revolution.
Cryptominers Found in Azure Kubernetes Containers
Images from a public repository contained cryptominers that Microsoft researchers found in Kubeflow instances running on Azure.
Knoxville Pulls IT Systems Offline Following Ransomware Attack
Knoxville's government took its network offline and turned off infected servers and workstations after a ransomware attack this week.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Fixes 129 Bugs in Largest Patch Tuesday Release
The June release of security updates addresses several remote code execution vulnerabilities in SharePoint, Excel, Windows OLE, and other services.

ICS Threat Snake Ransomware Suspected in Honda Attack
An attack targeting the automaker reportedly infected internal servers and led to the suspension of production at plants around the world.

Vulnerability in Plug-and-Play Protocol Puts Billions of Devices at Risk
"CallStranger" flaw in UPnP allows attackers to launch DDoS attacks and scan internal ports, security researcher says.

MORE
EDITORS' CHOICE

What Usability Means to Security Pros
The last thing cybersecurity executives and practitioners need are even more tools that are difficult to operate. Here's what they look for when assessing new tools.
The Hitchhiker's Guide to Web App Pen Testing
Time on your hands and looking to learn about web apps? Here's a list to get you started.
NEW FROM THE EDGE

Inside Stealthworker: How It Compromises WordPress, Step-by-Step
A new wave of attacks using old malware is threatening WordPress sites that don't have strong password policies.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Data In Motion & the New Normal

    The winding down of COVID-19 has everyone pondering The New Tomorrow, and no doubt you will be reviewing the state of your current networks and networking plans created previously. This likely means transforming your network architectures and security strategies, which ...

  • Red Team Realities: Testing that goes beyond compliance

    Using real-world anecdotes, this webinar will illustrate how to navigate a decision-making process aligned to use cases and desired outcomes tailored to your organization's needs. Listen as we discuss the different levels of cybersecurity assessments, and help you determine which ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.