Follow Dark Reading:
 July 27, 2021
LATEST SECURITY NEWS & COMMENTARY
Attackers' Use of Uncommon Programming Languages Continues to Grow
Attackers use uncommon languages — such as Go, D, Nim, and Rust — to evade detection or make their development process more efficient.
Kaseya Denies Paying Ransom for Decryption Tool
The company has still not explained the origin of the mysterious decryption tool, but it maintains that the firm neither paid a ransom on its own or through a third party.
IoT Search Engines Make It Easy to Find Vulnerable Devices, and That's a Problem
Here are five tips to protect your company.
Ransomware Is Top Concern for Many Security Pros: Report
A survey of IT and security professionals also reveals COVID-19 has significantly changed the malware landscape.
Deloitte Buys TransientX and Sentek Global
The deals are intended to expand Deloitte's zero-trust portfolio and broaden its reach into federal markets, the company reports.
Florida DEO Discloses Data Breach Affecting 58,000 Accounts
The Florida Department of Economic Opportunity says personal information may have been taken from its unemployment benefits system.
Relationship-Driven Incident Response = Resiliency to Ransomware Attacks
Ransomware is a threat that shouldn't take your organization by surprise if there is a resilient incident response plan in place to help mitigate risk.

(Sponsored Article) Relationship-Driven Incident Response = Resiliency to Ransomware Attacks

Ransomware is a threat that shouldn't take your organization by surprise if there is a resilient incident response plan in place to help mitigate risk.


MORE NEWS & COMMENTARY
HOT TOPICS
Cybercriminals Rewrite Malware to Target MacOS
Researchers discover a widespread, inexpensive malware variant has been redesigned to target both macOS and Windows devices.

How to Secure Your Cryptocurrency Wallet
With your investments in a digital wallet, under your control, you are the sole owner and can have the peace of mind that no institution can confiscate your digital assets.

Peloton Breach Reveals a Coming IoT Data Winter
We will see more and more Internet of Things attacks unless we adjust course quickly.

MORE
EDITORS' CHOICE

7 Hot Cyber Threat Trends to Expect at Black Hat
A sneak peek of some of the main themes at Black Hat USA next month.
Understanding and Mitigating Insider Threats in Today's Remote-Work World
The insider threat menace has grown during the pandemic, worsened by an increase in credential theft and broader use of shadow IT.
LATEST FROM THE EDGE

When Software Updates Get Hacked
Darned if you do, darned if you don't: Software fixes have become extensively automated, which works when software supply chains are secure. Yet with attackers focused on compromising those pipelines, is automated patching such a good idea?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Unifying Your Endpoint Security Strategy

    For enterprises that support many users and endpoints, building and maintaining a consistent security strategy was a major challenge even before 2020. Since the onset of the global pandemic, however, it has become more difficult than ever to build and maintain ...

  • Two Sides of the PAM Coin

    There are two sides of the PAM (Privileged Access Management) Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches, but don't stop there! We ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.