Follow Dark Reading:
 July 01, 2021
LATEST SECURITY NEWS & COMMENTARY
74% of Q1 Malware Was Undetectable Via Signature-Based Tools
Attackers have improved on tweaking old malware to continue sneaking it past traditional threat detection controls, researchers report.
SMB Worm Targeting EternalBlue Vuln Spreads to US
"Indexsinas" is the latest threat designed to exploit Windows servers that remain vulnerable to an NSA-developed exploit Microsoft patched more than four years ago.
Preinstalled Firmware Updater Puts 128 Dell Models at Risk
A feature of the computer maker's update utility does not correctly handle certificates, leaving systems open to firmware-level compromises.
Ransomware Losses Drive Up Cyber-Insurance Costs
Premiums have gone up by 7% on average for small firms and between 10% and 40% for medium and large businesses.
Attacks Erase Western Digital Network-Attached Storage Drives
The company suspects a remote code execution vulnerability affecting My Book Live and My Book Live Duo devices and recommends that business and individual users turn off the drives to protect their data.
D3FEND Framework Seeks to Lay Foundation for Cyber Defense
The MITRE project, funded by the National Security Agency, aims to create a foundation for analyzing and discussing cyber defenses and could shake up the vendor community.
Microsoft Refining Third-Party Driver Vetting Processes After Signing Malicious Rootkit
Rogue driver was distributed within gaming community in China, company says.
New CPU Baseline for Windows 11 Will Ensure Better Security, Microsoft Says
Redmond's latest OS will run only on systems with TPM 2.0 chips.
Expecting the Unexpected: Tips for Effectively Mitigating Ransomware Attacks in 2021
Cybercriminals continually innovate to thwart security protocols, but organizations can take steps to prevent and mitigate ransomware attacks.
3 Ways Cybercriminals Are Undermining MFA
Using multifactor authentication is an excellent security step, but like everything else, it is not foolproof and will never be 100% effective.
Microsoft Tracks New BazaCall Malware Campaign
Attackers use emails to prompt victims to call a fraudulent call center, where attackers instruct them to download a malicious file.
John McAfee, Creator of McAfee Antivirus Software, Dead at 75
McAfee, who was being held in a Spanish jail on US tax-evasion charges, had learned on Monday he would be extradited to the US.
MORE NEWS & COMMENTARY
HOT TOPICS
rMTD: A Deception Method That Throws Attackers Off Their Game
Through a variety of techniques, rotational Moving Target Defense makes existing OS and app vulnerabilities difficult to exploit. Here's how.

The Role of Encryption in Protecting LGBTQ+ Community Members
The Internet is a vital tool that helps LGBTQ+ community members communicate without fear of persecution -- and strong encryption is a critical part of this equation.

School's Out for Summer, but Don't Close the Book on Cybersecurity Training
Strengthening their security posture should be at the top of school IT departments' summer to-do list.

MORE
EDITORS' CHOICE

7 Unconventional Pieces of Password Wisdom
Challenging common beliefs about best practices in password hygiene.
Storms & Silver Linings: Avoiding the Dangers of Cloud Migration
We hear a lot about the sunlit uplands of cloud-powered business, but what about the risks of making information available across the organization?
LATEST FROM THE EDGE

An Interesting Approach to Cyber Insurance
What if insurers were to offer companies an incentive -- say, a discount -- for better protecting themselves? You know, the way car insurance companies offer lower premiums to customers who take a driver's ed course.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Incident Readiness and Response Playbook

    The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the ...

  • Building Threat Intelligence into Your Enterprise Security Strategy

    In recent years, many enterprises have discovered that they can improve their defenses by collecting data about broad trends in online attacks that may pertain to their own IT environments. This "threat intelligence" can make it easier for security teams ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.