Follow Dark Reading:
 May 14, 2018
LATEST SECURITY NEWS & COMMENTARY
Proofpoint Sounds Warning on Vega Stealer Targeted Data Theft Campaign
Marketing, PR, and advertising firms are among those being targeted.
Gandcrab Ransomware Exploits Website Vulnerabilities
Researchers find campaigns distributing Gandcrab by hosting malware on legitimate websites with poor security measures.
Hide and Seek Brings Persistence to IoT Botnets
The rapidly evolving Hide and Seek botnet is now persistent on a wide range of infected IoT devices.
The New Security Playbook: Get the Whole Team Involved
Smart cybersecurity teams are harnessing the power of human intelligence so employees take the right actions.
Newly Released Russian Facebook Ads Show Scale of Manipulation
House Democrats this week released 3,500 Facebook ads demonstrating the extent of Russia's influence on US citizens from 2015 to 2017.
MORE NEWS & COMMENTARY
HOT TOPICS
Phishing Attack Bypasses Two-Factor Authentication
Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.

Why DDoS Just Won't Die
Distributed denial-of-service attacks are getting bigger, badder, and 'blended.' What you can (and can't) do about that.

Phishing Threats Move to Mobile Devices
Mobile devices are emerging as a primary gateway for phishing attacks aimed at stealing data.

MORE
EDITORS' CHOICE

8 Ways Hackers Can Game Air Gap Protections
Isolating critical systems from connectivity isn't a guarantee they can't be hacked.
20 Signs You Are Heading for a Retention Problem
If you don't invest in your best security talent, they will look to burnish their resumes elsewhere. Here's why.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Electroneum Cryptomining Targets Microsoft IIS 6.0 Vulnerability
New campaign shows that there are still systems exposed to the year-old CVE-2017-7269 vuln on an operating system that was declared end-of-life three years ago.

Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

4 Critical Applications and How to Protect Them
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting their vulnerabilities.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.