Follow Dark Reading:
 February 03, 2021
LATEST SECURITY NEWS & COMMENTARY
Attackers Continue to Nibble at Apple's iOS Security
For the second time in less than three months, Apple has patched vulnerabilities in the software for iPhone and iPad, warning that the issues are already being targeted by attackers.
Agent Tesla Upgrades with New Delivery & Evasion Tactics
A new version of the remote access Trojan targets Microsoft Anti-Malware Software Interface to bypass endpoint detection.
Average Ransom Payments Declined Last Quarter
More victims appear to be realizing that paying a ransom doesn't guarantee stolen data will be purged.
How Recruiting Women Can Help Solve Security's Biggest Problems
We can solve cybersecurity's longstanding talent gap by bringing more women into the field.
RF Enables Takeover of Hostile Drones
Tempting as it may be to blast drones out of the sky, a less aggressive approach may yield better data about attackers - and keep bystanders safe.
FTC: ID Theft Doubled in 2020
The Federal Trade Commission said a surge in reports of identity theft occurred amid the COVID-19 pandemic.
SonicWall Confirms Zero-Day Vulnerability
The confirmation arrives as researchers with NCC Group detect a SonicWall zero-day flaw under active attack.
MORE NEWS & COMMENTARY
HOT TOPICS
US Needs Comprehensive Policy to Combat China on IP Theft
The United States cannot lose sight of Chinese cyber operations that target intellectual property, a panel of experts says.

Critical Vulnerability Patched in 'sudo' Utility for Unix-Like OSes
Flaw exists in versions of sudo going back nearly 10 years; USCYBERCOM recommends organizations patch immediately.

Strengthening Zero-Trust Architecture
Organizations that want to stay ahead of cybercriminals will find that going beyond user trust and device trust is critical for outwitting their adversaries.

MORE
EDITORS' CHOICE

Interview With a Russian Cybercriminal
A LockBit ransomware operator shared with researchers why he became involved in cybercrime, how he chooses victims, and what's in his toolbox.
6 Cybersecurity Start-Up Trends to Track
The pandemic took a bite out of funding deals, but cybersecurity start-ups fared better than many other industries.
LATEST FROM THE EDGE

Fighting Fileless Malware, Part 1: What Is It?
Despite multiple layers of protection, fileless malware cyberattacks remain rampant and difficult to defeat. In this, the first of The Edge's three-part series about the cyberthreat and how to fight back, you'll learn what fileless malware is and why it's so dangerous.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Optimizing App Performance in the Cloud

    Today's hybrid cloud architectures render traditional application performance troubleshooting and monitoring methods obsolete. Compounding matters, the wide-scale use of microservices and containers, and the adoption of continuous integration (CI) and continuous delivery (CD) principles mean constant change making it increasingly ...

  • Nip Ransomware in the FUD: Detecting Attacks Pre-Encryption

    In this webinar you'll get best practices and methodologies that organizations can use to detect threats, specific examples of actual compromises by ransomware operators, and guidance on how to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.