Follow Dark Reading:
 April 10, 2020
LATEST SECURITY NEWS & COMMENTARY
8 Phishing Lures Preying on Pandemic Panic
Phishing campaigns and scams are skyrocketing to take advantage of people concerned about COVID-19 impacts. Here are some key examples in action.
Schneier on Hacking Society
How the hacker mindset and skill set could play a role in improving and securing societal systems, according to renowned security technologist Bruce Schneier.
Emails Impersonating Trump, White House Seek to Exploit Pandemic Fears
The phishing campaign is only the latest among many related to COVID-19, INKY says.
Zoom, Microsoft & NTT Data Leaders Share Work-from-Home Security Tips
Tech leaders encourage organizations to maintain security awareness training and offer advice on how to protect their information.
No STEM, No Problem: How to Close the Security Workforce Gap
Those who work well with others, learn quickly, and possess a proactive mindset toward the work can make great employees, even if their backgrounds aren't rooted in cybersecurity.
Medical Devices on the IoT Put Lives at Risk
Device security must become as important a product design feature as safety and efficacy.
Zscaler to Buy Cloudneeti
The security service provider adds cloud security "posture" management with the deal.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft: Emotet Attack Shut Down an Entire Business Network
The infection started with a phishing email and spread throughout the organization, overheating all machines and flooding its Internet connection.

Chinese APT Groups Targeted Enterprise Linux Systems in Decade-Long Data Theft Campaign
Organizations across multiple industries compromised in a systematic effort to steal IP and other sensitive business data, BlackBerry says.

More Attackers Have Begun Using Zero-Day Exploits
Vendors of offensive cyber tools have made it easy for any threat group with the right funds to leverage unpatched bugs, FireEye says.

MORE
EDITORS' CHOICE

9 Security Podcasts Worth Tuning In To
Recommendations for podcasts discussing news, trends, guidance, and stories across the cybersecurity industry.
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Criminal, political, and strategic factors are combining to create a perfect storm of cyber infections that target the global supply chain.
NEW FROM THE EDGE

How Do I Make Sure My Work-From-Home Users Install Updates?
Most enterprise endpoint solutions will support policies to enforce recommended updates.
The Edge Names 'Holy Cow' Cartoon Caption Winners
What can cows possibly have to do with cybersecurity?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Security Alert Fatigue: Tips for Taking Control

    Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the ...

  • 5 Steps to Integrate SAST into the DevSecOps Pipeline

    Join us as we walk you through the challenges and benefits of integrating a SAST tool into your DevSecOps pipeline and how we've helped other organizations with this process.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.