Follow Dark Reading:
 June 04, 2019
LATEST SECURITY NEWS & COMMENTARY
Baltimore Ransomware Attacker Was Behind Now-Suspended Twitter Account
Researchers at Armor were able to confirm the person or persons behind a Twitter account that appeared to be leaking confidential files was the actual ransomware attacker that hit the city.
Microsoft Urges Businesses to Patch 'BlueKeep' Flaw
Fearing another worm of WannaCry severity, Microsoft warns vulnerable users to apply the software update for CVE-2019-0708.
Zebrocy APT Group Expands Malware Arsenal with New Backdoor Family
Group's constant experimentation and malware changes are complicating efforts for defenders, Kaspersky Lab says.
Certifiably Distracted: The Economics of Cybersecurity
Is cybersecurity worth the investment? It depends.
Majority of C-Level Executives Expect a Cyber Breach
Survey of executives in the US and UK shows that worries abound -- about cyberattacks and the lack of resources to defend against them.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Ways to Authenticate Without Passwords
Passwordless authentication has a shot at becoming more ubiquitous in the next few years. We take a look at where things stand at the moment.

Docker Vulnerability Opens Servers to Container Code
Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE.

2.3B Files Currently Exposed via Online Storage
Digital Shadows researchers scanned various online file-sharing services and concluded the number of exposed files is up 50% from March of 2018.

MORE
EDITORS' CHOICE

GDPR's First-Year Impact By the Numbers
The latest statistics on GDPR spending, compliance rates, enforcement, and consumer attitudes on privacy protection.
Focusing on Endpoints: 5 Steps to Fight Cybercrime
Follow these best practices to strengthen endpoint management strategies and protect company data.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 2019 Trends Report: The Zero Trust Journey

    Protecting the network is important but it's no longer enough to secure applications and data. That's why adoption of a Zero Trust security framework is on the rise. Register and attend this webinar to find out more.

  • Extending the Value of SD-WAN with Cloud Unified Communications

    An expert panel will discuss important considerations that need to be taken into account to migrate off of legacy MPLS networks and premises-based PBXs; creating a solution that is compelling for both customers and employees.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.