Follow Dark Reading:
 February 22, 2021
LATEST SECURITY NEWS & COMMENTARY
Attackers Already Targeting Apple's M1 Chip with Custom Malware
A proof-of-concept program infects systems with ARM64-compiled binaries and then reaches out to download additional functionality.
Microsoft Concludes Internal Investigation into Solorigate Breach
The software giant found no evidence that attackers gained extensive access to services or customer data.
How to Fine-Tune Vendor Risk Management in a Virtual World
Without on-site audits, many organizations lack their usual visibility to assess risk factors and validate contracts and SLA with providers.
Kia Denies Ransomware Attack as IT Outage Continues
Kia Motors America states there is no evidence its recent systems outage was caused by a ransomware attack.
CrowdStrike Buys Log Management Startup Humio for $400M
CrowdStrike plans to use Humio's technology to continue building out its extended detection and response platform.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Azure Front Door Gets a Security Upgrade
New SKUs in Standard and Premium preview beef up the security of the content delivery network platform.

Egregor Arrests a Blow, but Ransomware Will Likely Bounce Back
Similar to previous ransomware takedowns, this disruption to the ransomware-as-a-service model will likely be short-lived, security experts say.

Data Security Accountability in an Age of Regular Breaches
As the number of vendors impacted by supply chain breaches grows, one constant question remains: Where exactly does accountability for data security lie, and what part do end users play in their own data breach protection?

MORE
EDITORS' CHOICE

How to Run a Successful Penetration Test
These seven tips will help ensure a penetration test improves your organization's overall security posture.
Hiding in Plain Sight: What the SolarWinds Attack Revealed About Efficacy
Multilayered infiltration involved custom malicious tooling, backdoors, and cloaked code, far beyond the skills of script kiddies.
LATEST FROM THE EDGE

Fighting Fileless Malware, Part 3: Mitigations
Attackers can dodge the countermeasures you employ against fileless malware. So how do you mitigate the damage?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Key technology trends in 2021 - Making these technologies work for your business

    The focus of this webinar, taking place on March 04 at 02:00 PM Singapore Time, is to identify some of the key technology trends that will further mature and innovate in 2021, and what potential challenges these will bring to application developers and ...

  • 5 Steps to Solving Modern Scalability Problems

    Attend this webinar to learn how distributed data models can keep up with today's data columns and offer other benefits like resiliency, tunability, enhanced security and faster performance, how you can simplify microservices management and improve scalability, and why cloud-native ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.