Follow Dark Reading:
 July 15, 2020
LATEST SECURITY NEWS & COMMENTARY
99% of Websites at Risk of Attack Via JavaScript Plug-ins
The average website includes content from 32 different third-party JavaScript programs, new study finds.
New Mirai Variant Surfaces with Exploits for 9 Vulnerabilities Products
Impacted products include routers, IP cameras, DVRs, and smart TVs.
Microsoft Patches Wormable RCE Flaw in Windows DNS Servers
Patch Tuesday security updates address a critical vulnerability in Windows DNS Servers, which researchers believe is likely to be exploited.
Google Cloud Unveils 'Confidential VMs' to Protect Data in Use
Confidential Virtual Machines, now in beta, will let Google Cloud customers keep data encrypted while it's in use.
DevSecOps Requires a Different Approach to Security
Breaking applications into microservices means more difficulty in gaining good visibility into runtime security and performance issues, says startup Traceable.
'Make Your Bed' and Other Life Lessons for Security
Follow this advice from a famous military commanders' commencement speech and watch your infosec team soar.
Critical Vulnerability Hits SAP Enterprise Applications
RECON could allow an unauthenticated attacker to take control of SAP enterprise applications through the web interface.
MORE NEWS & COMMENTARY
HOT TOPICS
When WAFs Go Wrong
Web application firewalls are increasingly disappointing enterprises today. Here's why.

How Advanced Attackers Take Aim at Office 365
Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.

Zero-Trust Efforts Rise with the Tide of Remote Working
With employees likely to continue to spend much, if not all, of their time working from home, companies are focusing more on technologies to boost the security of their now-distributed workplace.

MORE
EDITORS' CHOICE

6 Tips for Getting the Most From Nessus
Books have been written on using the powerful network-discovery and vulnerability-scanning tool. These tips will help you get started.
Crypto-Primer: Encryption Basics Every Security Pro Should Know
With so many choices for encrypting data and communication, it's important to know the pros and cons of different techniques.
LATEST FROM THE EDGE

As Offices Reopen, Hardware from Home Threatens Security
Devices out of sight for the past several months could spell trouble when employees bring them back to work.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Don't Miss this Event Featuring Rob Carter - CIO of FedEx

    In these tumultuous times, IT organizations are tasked with two critical, yet often conflicting priorities: increasing online innovation and cutting IT costs. In this eye-opening keynote address you'll get a first-hand perspective on how organizations can implement new IT strategies ...

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.