Follow Dark Reading:
 July 02, 2020
LATEST SECURITY NEWS & COMMENTARY
Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign
Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.
DHS Shares Data on Top Cyberthreats to Federal Agencies
Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.
Businesses Invest in Cloud Security Tools Despite Concerns
A majority of organizations say the acceleration was driven by a need to support more remote employees.
Chinese Software Company Aisino Uninstalls GoldenSpy Malware
Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.
4 Steps to a More Mature Identity Program
Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.
Another COVID-19 Side Effect: Rising Nation-State Cyber Activity
While financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs.
New MacOS Ransomware Hides in Pirated Program
A bogus installer for Little Snitch carries a ransomware hitchhiker.
Microsoft Issues Out-of-Band Patches for RCE Flaws
Vulnerabilities had not been exploited or publicly disclosed before fixes were released, Microsoft reports.
MORE NEWS & COMMENTARY
HOT TOPICS
5 New InfoSec Job Training Trends: What We're Studying During COVID-19
With the pandemic uprooting networks and upending careers, which security skills are hot -- and which are not?

Major US Companies Targeted in New Ransomware Campaign
Evil Corp. group hit at least 31 customers in campaign to deploy WastedLocker malware, according to Symantec.

Another Record-Breaking DDoS Attack Signals Shift in Criminal Methods
Malicious botnet sources explode in new attacks that push boundaries in terms of volume and duration.

MORE
EDITORS' CHOICE

7 Tips for Effective Deception
The right decoys can frustrate attackers and help detect threats more quickly.
Tall Order for Small Businesses: 3 Tips to Find Tailored Security Solutions
SMBs are responsible for nearly 44% of US economic activity, but given the current climate, it can be difficult for them to find available and/or affordable resources.
NEW FROM THE EDGE

Profile of the Post-Pandemic CISO
Projects that were high priorities before the COVID-19 outbreak have taken a back seat to new business needs. For security leaders that has meant new responsibilities that could very well stick around in the pandemic's aftermath.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.