Follow Dark Reading:
 May 24, 2017
LATEST SECURITY NEWS & COMMENTARY
9 Ways Organizations Sabotage Their Own Security: Lessons from the Verizon DBIR
Mistakes and missteps plague enterprise security. The Verizon 2017 Data Breach Investigations Report (DBIR) offers nuggets on what organizations must stop doing - now.
Data Breach, Vulnerability Data on Track to Set New Records in 2017
There are so far 1,254 publicly reported data breaches and 4,837 published vulnerabilities in the first quarter of this year.
Credential-Stuffing Threat Intensifies Amid Password Reuse
Employees who reuse logins on multiple websites drive the impact of third-party breaches as hackers use credential stuffing to compromise more accounts.
Staying a Step Ahead of Internet Attacks
There's no getting around the fact that targeted attacks - like phishing - will happen. But you can figure out the type of attack to expect next.
With Billions Spent on Cybersecurity, Why Are Problems Getting Worse?
Technology alone won't keep you safe. Fully engaged employees should be your first line of defense.
Hacker Hit with 30-Month Prison Term in Securities Case
Ukrainian hacker sentenced for his role stealing press releases about upcoming stock trades that generated roughly $30 million in illegal profits.
MORE NEWS & COMMENTARY
HOT TOPICS
5 Security Lessons WannaCry Taught Us the Hard Way
There is a lot more our industry should be doing to protect its systems and data from cyber blackmail.

Don't Forget Basic Security Measures, Experts Say
Some security leaders argue there is little point in worrying about emerging threats when businesses can't defend against today's attacks.

NSA Tools Behind WannaCry Being Used In Even Bigger Attack Campaign
Attackers have been using NSAs EternalBlue and Double Pulsar to distribute AdylKuzz cryptocurrency malware to hundreds of thousands of systems, Proofpoint says.

MORE
IN CASE YOU MISSED IT

Artificial Intelligence: Cybersecurity Friend or Foe?
The next generation of situation-aware malware will use AI to behave like a human attacker: performing reconnaissance, identifying targets, choosing methods of attack, and intelligently evading detection.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] New Methods for Managing the Skills Shortage

    In this webinar, security experts discuss methods for doing better security with fewer people, including: Time-saving tools for automating security functions, effective ways to use outsourcing and third-party services, creative places to look for new talent and the best ways ...

  • Data Tells: Dissecting Every Day Data

    Join us as the author of the book "Everydata: The Misinformation Hidden in the Little Data You Consume Every Day" examines common ways data is misrepresented or misinterpreted, the limitations of forecasts and predictions, and how to recognize "Tells" in ...

MORE WEBINARS

Partner Perspectives

WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack.

Malspam Causing Havoc for Mac & Windows
Spam is a multi-platform, multi-vector approach to network compromise, and organizations need to weigh up the risks on all fronts to be able to combat it successfully.

OSX.Bella: Mac Malware Strikes Again
This variant of the OSX.Dok dropper behaves altogether differently, and installs a completely different payload.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.