Follow Dark Reading:
 July 29, 2021
LATEST SECURITY NEWS & COMMENTARY
Attackers' Use of Uncommon Programming Languages Continues to Grow
Attackers use uncommon languages — such as Go, D, Nim, and Rust — to evade detection or make their development process more efficient.
Kaseya Offers Customers Decryption Key for Massive Ransomware Attack
The remote management software company will not disclose the source of the decryption key, but at least one company has confirmed that it works.
Data Breach Cost Hits Record High of $4.24M
The per-breach cost represents a 10% increase from the average cost per incident recorded one year prior, IBM reports.
Praying Mantis Threat Group Targeting US Firms in Sophisticated Attacks
Group's advanced memory-resident attacks similar to those employed in sustained campaign against Australian companies and government last year, security vendor says.
What Does It Take to Secure Containers?
A vast majority of DevOps practitioners say containerization technology provides security, but some companies — especially security firms — disagree.
CISA, FBI Name the Most Exploited Vulnerabilities Over the Past Year
List shows many relatively new and perimeter-like devices targeted in 2020 and 2021, according to an analysis by CISA, the FBI, the Australian Cyber Security Centre, and the United Kingdom’s National Cyber Security Centre.
Memory Corruption Issues Lead 2021 CWE Top 25
The MITRE Common Weakness Enumeration (CWE) team's latest list of most dangerous software flaws includes several that shot up in significance since 2020.
Understanding and Mitigating Insider Threats in Today's Remote-Work World
The insider threat menace has grown during the pandemic, worsened by an increase in credential theft and broader use of shadow IT.
Managing Increased Cyber-Physical Security Threats in a Hyper-Connected World
Physical security and cybersecurity can't be managed separately.
IoT Search Engines Make It Easy to Find Vulnerable Devices, and That's a Problem
Here are five tips to protect your company.
White House Issues Memo on US Critical Infrastructure Security
The memo describes critical infrastructure threats as one of the most significant issues confronting the nation.
Malware Infects Japanese Devices Ahead of Olympic Games
A Japanese security company reports the wiper malware searches for specific file types in a target's personal Windows folder.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Hot Cyber Threat Trends to Expect at Black Hat
A sneak peek of some of the main themes at Black Hat USA next month.

Software Security: A Sounding Board for Needed Change
If the federal government is going to have software that performs critical functions, it must take complete ownership, accountability, and oversight of software from concept to delivery, through maintenance.

When Software Updates Get Hacked
Darned if you do, darned if you don't: Software fixes have become extensively automated, which works when software supply chains are secure. Yet with attackers focused on compromising those pipelines, is automated patching such a good idea?

MORE
EDITORS' CHOICE

8 Security Tools to be Unveiled at Black Hat USA
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
Why Trust Matters for the National Artificial Intelligence Research Resource Task Force
As the National Artificial Intelligence Research Resource Task Force sets about its work preparing recommendations for the creation of an AI research resource in the United States, fundamental problems of trust must be addressed.
LATEST FROM THE EDGE

101: Why BGP Hijacking Just Won't Die
A look at the dangers of attacks on the Internet's Border Gateway Protocol and what ISPs and enterprises can do about them.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Unifying Your Endpoint Security Strategy

    For enterprises that support many users and endpoints, building and maintaining a consistent security strategy was a major challenge even before 2020. Since the onset of the global pandemic, however, it has become more difficult than ever to build and maintain ...

  • Two Sides of the PAM Coin

    There are two sides of the PAM (Privileged Access Management) Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches, but don't stop there! We ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.