Follow Dark Reading:
 October 11, 2019
LATEST SECURITY NEWS & COMMENTARY
AppSec 'Spaghetti on the Wall' Tool Strategy Undermining Security
At many organizations, the attitude to securing software appears to be throwing a lot of technology at the problem, a new study finds.
Attackers Hide Behind Trusted Domains, HTTPS
One in four malicious URLs employed a legitimate domain, making it more difficult for potential victims to spot possible dangers, a mid-year report finds.
iTunes Zero-Day Exploited to Deliver BitPaymer
The ransomware operators targeted an "unquoted path" vulnerability in iTunes for Windows to evade detection and install BitPaymer.
Magecart Attack on Volusion Highlights Supply Chain Dangers
Attackers compromised Volusion's Google Cloud environment to load malicious skimmer code onto more than 6,500 customer sites.
How to Think Like a Hacker
In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated.
Network Security Must Transition into the Cloud Era
An integrated approach is the best way to provide organizations with the tools they need to decrease the attack surface and use strong security controls.
Akamai Snaps Up ChameleonX to Tackle Magecart
The Israel-based ChameleonX aims to protect websites from cyberattacks targeting payment data.
Imperva Details Response to Customer Database Exposure
The cloud security's CEO and CTO lay out the timeline of events and the steps customers should take to protect their accounts.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Active Directory Security Tips for Your Poor, Neglected AD
The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.

Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage'
In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?

8 Ways Businesses Unknowingly Help Hackers
From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in.

MORE
EDITORS' CHOICE

7 Considerations Before Adopting Security Standards
Here's what to think through as you prepare your organization for standards compliance.
A Realistic Threat Model for the Masses
For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here's why.
Check Out New Cybersecurity Tools in the Black Hat Europe Arsenal
Black Hat Europe returns to the Excel in London December 2-5 bearing a cornucopia of intriguing cybersecurity tools in its Arsenal.
NEW FROM THE EDGE

Works of Art: Cybersecurity Inspires 6 Winning Ideas
The Center for Long Term Cybersecurity recently awarded grants to six artists in a contest to come up with ideas for works with security themes and elements. Check 'em out.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • State of the Cloud

    This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies ...

  • 2019 State of DevOps

    DevOps is needed in today's business environment, where improved application security is essential and users demand more applications, services, and features -- fast. We sought to see where DevOps adoption and deployment stand, this report summarizes our survey findings. Find ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.