Follow Dark Reading:
 March 01, 2018
LATEST SECURITY NEWS & COMMENTARY
93% of Cloud Applications Aren't Enterprise-Ready
The average business uses 1,181 cloud services, and most don't meet all recommended security requirements, Netskope says.
Memcached Servers Being Exploited in Huge DDoS Attacks
Multiple vendors this week say they have seen a recent spike in UDP attacks coming in via port 11211.
The State of Application Penetration Testing
Data from real-world pen tests shows configuration errors and cross-site scripting are the most commonly found vulnerabilities.
'OMG': New Mirai Variant Converts IoT Devices into Proxy Servers
The new malware also can turn bots into DDoS attack machines, says Fortinet.
Anatomy of an Attack on the Industrial IoT
How cyber vulnerabilities on sensors can lead to production outage and financial loss.
New Android Malware Family Highlights Evolving Mobile Threat Capabilities
RedDrop can steal data, record audio, and rack up SMS charges for victims, says Wandera.
Incident 'Management': What IT Security Can Learn from Public Safety
How a framework developed for fighting California wildfires back in the '70s can fortify first responders to a modern cyberattack.
MORE NEWS & COMMENTARY
HOT TOPICS
SAML Flaw Lets Hackers Assume Users' Identities
Vulnerability affects single sign-on for SAML-reliant services including OneLogin, Duo Security, Clever, and OmniAuth.

6 Cybersecurity Trends to Watch
Expect more as the year goes on: more breaches, more IoT attacks, more fines...

Threats from Mobile Ransomware & Banking Malware Are Growing
The number of unique mobile malware samples increased sharply in 2017 compared to a year ago, according to Trend Micro.

MORE
EDITORS' CHOICE

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples
From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows.
March Dark Reading Event Calendar Spans BlackOps to SecDevOps
These upcoming webinars will help you comprehend the mysterious machinations inside the minds of hackers and in-house developers.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.