Follow Dark Reading:
 June 24, 2017
LATEST SECURITY NEWS & COMMENTARY
8 Hot Hacking Tools to Come out of Black Hat USA
High-impact tools for white hats that will be revealed and released next month at Black Hat USA in Las Vegas.
RAT Vulnerabilities Turn Hackers into Victims
A small number of Remote Administration Tools have vulnerabilities which can enable attack targets to turn the tables on threat actors.
Threat Intelligence Sharing: The New Normal?
The spirit of cooperation seems to be taking hold as demonstrated by the growing number of thriving services and organizations whose sole purpose is to analyze specific threats against specific communities.
$12B in Fraud Loss Came from Data Breach Victims in 2016
Three-quarters of the total fraud losses for 2016 arose from victims who had been victims of a data breach within the previous six years.
Android Marcher Variant Makes Rounds as Adobe Flash Player Update
Zscaler researchers discover a new variant of the Android Marcher malware, which aims to steal online banking credentials and credit card information.
MORE NEWS & COMMENTARY
HOT TOPICS
Hacker Bypasses Microsoft ATA for Admin Access
Microsoft's Advanced Threat Analytics defense platform can be cheated, a researcher will show at Black Hat USA next month.

WannaCry Forces Honda to Take Production Plant Offline
Work on over 1,000 vehicles affected at automaker's Sayama plant in Japan while systems were restored.

Cybersecurity Fact vs. Fiction
Based on popular media, it's easy to be concerned about the security of smart cars, homes, medical devices, and public utilities. But how truly likely are such attacks?

MORE
EDITORS' CHOICE

WannaCry? You're Not Alone: The 5 Stages of Security Grief
As breach after breach hits the news, security professionals cope with the classic experiences of denial, anger, bargaining, depression, and acceptance.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How Cloud Can Streamline Business Workflow

    In order to optimize your utilization of cloud computing, you need to be able to deliver reliable and scalable high performing application over your corporate network. Your business counterparts will expect you to provide network performance that can handle all ...

  • Securing Your Endpoints from Ransomware & Other Trending Attacks

    Attackers have shifted their tactics. They've discovered new ways to re-engineer tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these sophisticated attacks, ...

MORE WEBINARS

Partner Perspectives

Talking Cyber-Risk with Executives
Explaining risk can be difficult since CISOs and execs don't speak the same language. The key is to tailor your message for the audience.

Cloud Security & the Power of Shared Responsibility
When you and your CSP jointly embrace the shared security responsibility model you can achieve greater success than you or your provider can achieve alone.

Cyber Insurance: Read the Fine Print!
Applying for insurance is a grueling process involving detailed questionnaires and lengthy technical interviews that can still leave you without an adequate safety net.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.