Follow Dark Reading:
 May 18, 2020
LATEST SECURITY NEWS & COMMENTARY
8 Supply Chain Security Requirements
Complex supply chains have complex security requirements, but secure them you must. Here's where to start.
UK Supercomputing Service ARCHER Still Offline After Monday Attack
Incident comes amid US warnings about Chinese cybergroups targeting organizations involved in COVID-19-related research.
4 Challenges with Existing VPNs
A VPN is a step in the right direction, but it's not the be-all and end-all when it comes to security and falls short in many ways.
Templates Make Coronavirus Phishing Campaigns Easy
Ready-made website templates make it simple for criminals to create fake government and NGO websites for COVID-19-related phishing campaigns.
Microsoft Open Sources Its Coronavirus Threat Data
Microsoft's COVID-19 intelligence will be made publicly available to help businesses fight virus-related security threats.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
Thunderbolt Vulnerabilities Could Threaten Millions of PCs
Attackers with physical access to targeted machines could exploit these flaws to access and copy data within minutes, researchers say.

New Cyber-Espionage Framework Dubbed Ramsay
The framework is designed to collect and exfiltrate sensitive documents from air-gapped networks.

Microsoft Patch for Reverse RDP Flaw Leaves Room for Other Attacks
Fix released in February is Microsoft's second pass at fully addressing issue that Check Point first disclosed at Black Hat USA last summer.

MORE
EDITORS' CHOICE

The Modern SOC Demands New Skills
Automation and other technologies are improving the organizational structure of the security operations center. This is ultimately for the better, but it means that roles will change too.
6 Free Cybersecurity Training and Awareness Courses
Most are designed to help organizations address teleworking risks related to COVID-19 scams.
NEW FROM THE EDGE

The Entertainment Biz Is Changing, But the Cybersecurity Script Is One We've Read Before
Several A-list celebrities have found themselves at the center of a ransomware attack -- and it's certainly not the first time hackers have gone after them or the entertainment industry. What are security pros doing wrong?
Tech Resources
ACCESS TECH LIBRARY NOW

  • How to Effectively Analyze Security Data

    In this webinar, experts discuss ways to effectively collect and analyze large amounts of security data, and find the threat info you need to defend your enterprise. Register Today!

  • Building a Strategy for Detection and Response

    Hear as top industry experts discuss how to create a strategy that enables the enterprise security team to do detection and response across a wide variety of technologies and services.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.