Follow Dark Reading:
 May 06, 2021
LATEST SECURITY NEWS & COMMENTARY
Attackers Seek New Strategies to Improve Macros' Effectiveness
The ubiquity of Microsoft Office document formats means attackers will continue to use them to spread malware and infect systems.
Wanted: The (Elusive) Cybersecurity 'All-Star'
Separate workforce studies by (ISC) 2 and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the field.
Will 2021 Mark the End of World Password Day?
We might be leaving the world of mandatory asterisks and interrobangs behind for good.
DoD Lets Researchers Target All Publicly Accessible Info Systems
The Department of Defense expands its vulnerability disclosure program to include a broad range of new targets.
Gap Between Security and Networking Teams May Hinder Tech Projects
Professionals in each field describe a poor working relationship between the two teams
MORE NEWS & COMMENTARY
HOT TOPICS
Hundreds of Millions of Dell Computers Potentially Vulnerable to Attack
Hardware maker has issued an update to fix multiple critical privilege escalation vulnerabilities that have gone undetected since 2009.

Your Digital Identity's Evil Shadow
In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.

10K Hackers Defend the Planet Against Extraterrestrials
Hack the Planet's Cyber Apocalypse capture-the-flag contest attracts 10,000 competitors from across the globe.

MORE
EDITORS' CHOICE

7 Modern-Day Cybersecurity Realities
Security pros may be working with a false sense of security. We explore seven places where old methods and techniques have to change to keep their organizations safe.
It's Time to Ditch Celebrity Cybersecurity
High-profile attacks and solutions are shiny objects that can distract from the defenses that afford the greatest protection.
LATEST FROM THE EDGE

Debating Law Enforcement's Role in the Fight Against Cybercrime
The FBI's action to remove Web shells from compromised Microsoft Exchange Servers sparks a broader discussion about officials' response to cyberattacks.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making XDR Work in Your Enterprise - Dark Reading

    In this Dark Reading webinar, experts discuss the real-life implementation issues surrounding emerging detection and response technologies. You'll learn how these emerging technologies can be integrated with your existing cybersecurity tools, and how XDR technology might affect your cybersecurity operations ...

  • Keys to Better Cyber Risk Assessment

    At this Dark Reading webinar, learn about the costs associated with today's threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.