Follow Dark Reading:
 March 26, 2018
LATEST SECURITY NEWS & COMMENTARY
7 Ways to Protect Against Cryptomining Attacks
Implementing basic security hygiene can go a long way in ensuring your systems and website don't get hijacked.
AMD Will Release Fixes for New Processor Flaws in a Few Weeks
Security firm that disclosed flaws accuses chipmaker of downplaying flaws; says timeline is overly optimistic.
Looking Back and Thinking Ahead on Cyberwar, Nation-State Attacks
In the domain of cyber warfare, the effective strategies for fighting yesterday's cyberattacks will not work against tomorrow's, experts said.
DoJ Indicts 9 Iranians for Hacking into Hundreds of Universities, FERC, Dept. of Labor, Others
Suspects were operating on behalf of Iranian government and the Iranian Revolutionary Guard, US officials said.
Looking Back to Look Ahead: Cyber Threat Trends to Watch
Data from the fourth quarter of last year shows the state of application exploits, malicious software, and botnets.
MORE NEWS & COMMENTARY
HOT TOPICS
Is Application Security Dead?
The nature of the field has changed greatly because of the move to the cloud and enterprise digital transformation.

Azure Guest Agent Design Enables Plaintext Password Theft
Researchers find attackers can abuse the design of Microsoft Azure Guest Agent to recover plaintext administrator passwords.

Russian APT Compromised Cisco Router in Energy Sector Attacks
DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.

MORE
EDITORS' CHOICE

7 Spectre/Meltdown Symptoms That Might Be Under Your Radar
The Spectre/Meltdown pair has a set of major effects on computing but there are impacts on the organization that IT leaders might not have considered in the face of the immediate problem.
How Serverless Computing Reshapes Security
The new division of responsibility moves some security concerns off a business's plate while changing priorities for other risks.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Applications & Identities Initial Targets in 86% of Breaches: Report
The startling numbers of breached data are sobering: 11.8 billion records compromised in 337 of 433 incidents examined by F5 researchers. They include 10.3 billion usernames, passwords, and email accounts.

Cybersecurity Spring Cleaning: 3 Must-Dos for 2018
Why 'Spectre' and 'Meltdown,' GDPR, and the Internet of Things are three areas security teams should declutter and prioritize in the coming months.

How to Interpret the SEC's Latest Guidance on Data Breach Disclosure
Forward-looking organizations should view this as an opportunity to reevaluate their cybersecurity posture and install best practices that should have already been in place.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.