Follow Dark Reading:
 July 30, 2020
LATEST SECURITY NEWS & COMMENTARY
Average Cost of a Data Breach: $3.86 Million
New IBM study shows that security system complexity and cloud migration can amplify breach costs.
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
A flaw in the GRUB2 bootloader affects most Linux devices and some Windows computers using UEFI Secure Boot.
The Future's Biggest Cybercrime Threat May Already Be Here
Current attacks will continue to be refined, and what may seem a weakness now could turn out to be a disaster.
Technical Challenges of IoT Cybersecurity in a Post-COVID-19 World
Effective management of vulnerabilities can be done only when information about supply chain dependencies is accurate and recent.
Security Flaws Discovered in OKCupid Dating Service
Researchers identified a variety of vulnerabilities in apps and websites for the popular online dating platform.
70,000+ WordPress Sites Affected by Critical Plug-in Flaw
A vulnerability in the wpDiscuz plug-in could let attackers remotely execute code on the servers of affected websites.
MORE NEWS & COMMENTARY
HOT TOPICS
Twilio Security Incident Shows Danger of Misconfigured S3 Buckets
Twilio says attackers accessed its misconfigured cloud storage system and altered a copy of the JavaScriptSDK it shares with customers.

Email Security Features Fail to Prevent Phishable 'From' Addresses
The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers.

Cybersecurity Lessons from the Pandemic
How does cybersecurity support business and society? The pandemic shows us.

MORE
EDITORS' CHOICE

11 Security Tools to Expect at the Black Hat USA 2020 Arsenal Virtual Event
More than 130 security researchers and developers are ready to showcase their work.
Dark Reading Video News Desk Returns to Black Hat
Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!
NEW FROM THE EDGE

How to Decipher InfoSec Job Titles' Mysteries
Figuring out which cybersecurity job you want -- or are qualified for -- can be difficult when words have no consistent meaning in the industry.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How Cyber Attackers Will Use & Abuse AI, ML Against the Enterprise

    In this webinar, get a picture of the actual threat landscape today, realistic predictions of how it will evolve, and what businesses can do now to prepare for the future.

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.