In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
Follow Dark Reading:
 June 22, 2022
LATEST SECURITY NEWS & COMMENTARY
56 Vulnerabilities Discovered in OT Products From 10 Different Vendors
Deep-dive study unearthed security flaws that could allow remote code execution, file manipulation, and malicious firmware uploads, among other badness.
Risk Disconnect in the Cloud
New Cloud Security Alliance (CSA) and Google Cloud study shows many enterprises struggle to measure and manage risk in their cloud workloads.
VPNs Persist Despite Zero-Trust Fervor
Most organizations still rely on virtual private networks for secure remote access.
China-Linked ToddyCat APT Pioneers Novel Spyware
ToddyCat's Samurai and Ninja tools are designed to give attackers persistent and deep access on compromised networks, security vendor says.
BRATA Android Malware Evolves Into an APT
The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities.
Why Financial Institutions Must Double Down on Open Source Investments
Open source is here to stay, and it's imperative that CIOs have a mature, open source engagement strategy, across consumption, contribution, and funding as a pillar of digital transformation.
AI Is Not a Security Silver Bullet
AI can help companies more effectively identify and respond to threats, as well as harden applications.
RIG Exploit Kit Replaces Raccoon Stealer Trojan With Dridex
After the Raccoon Stealer Trojan disappeared, the RIG Exploit Kit seamlessly adopted Dridex for credential theft.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Atlassian Confluence Server Bug Under Active Attack to Distribute Ransomware
Most of the attacks involve the use of automated exploits, security vendor says.

Capital One Attacker Exploited Misconfigured AWS Databases
After bragging in underground forums, the woman who stole 100 million credit applications from Capital One has been found guilty.

The Cybersecurity Diversity Gap: Advice for Organizations Looking to Thrive
Companies need to fill some of the 3.5 million empty cybersecurity seats with workers who bring different experiences, perspectives, and cultures to the table. Cut a few doors and windows into the security hiring box.

MORE
EDITORS' CHOICE
7 Ways to Avoid Worst-Case Cyber Scenarios
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
LATEST FROM THE EDGE

Evolving Beyond the Password: It's Time to Up the Ante
While there's an immediate need to improve MFA adoption, it's also critical to move to more advanced and secure passwordless frameworks, including biometrics. (Part 1 of 2)
LATEST FROM DR TECHNOLOGY

Reducing Risk With Zero Trust
Zero trust isn’t just about authentication. Organizations can combine identity data with business awareness to address issues such as insider threat.
WEBINARS
  • Using Threat Modeling to Improve Enterprise Cyber Defenses

    As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize ...

  • Vendors as Your Largest BEC Threat

    The tactics that worked for your business five years ago likely aren't still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.