Follow Dark Reading:
 October 20, 2017
LATEST SECURITY NEWS & COMMENTARY
'BoundHook' Technique Enables Attacker Persistence on Windows Systems
CyberArk shows how attackers can leverage Intel's MPX technology to burrow deeper into a compromised Windows system.
New Locky Ransomware Strain Emerges
Latest version goes by the .asasin extension and is collecting information on users' computer operating system and IP address.
What's Next after the SEC 'Insider Trading' Breach?
Last month's hack of the Security Exchange Commission may prove to be the most high-profile corporate gatekeeper attack to date. But it definitely won't be the last.
IoT Deployment Security Top Concern for Enterprises
A new survey shows that 63% of respondents are worried about the impact of the Internet of Things on corporate security technologies and processes.
Game Change: Meet the Mach37 Fall Startups
CEOs describe how they think their fledgling ventures will revolutionize user training, privacy, identity management and embedded system security.
MORE NEWS & COMMENTARY
HOT TOPICS
Secure Wifi Hijacked by KRACK Vulns in WPA2
All modern WiFi access points and devices that have implemented the protocol vulnerable to attacks that allow decryption, traffic hijacking other attacks. Second, unrelated crypto vulnerability also found in RSA code library in TPM chips.

10 Major Cloud Storage Security Slip-Ups (So Far) this Year
Accenture is the latest in a string of major companies to expose sensitive cloud data this year, following Verizon, Deloitte, and Dow Jones.

Cybersecurity's 'Broken' Hiring Process
New study shows the majority of cybersecurity positions get filled at salaries above the original compensation cap, while jobs sit unfilled an average of six months.

MORE
EDITOR'S CHOICE

10 Social Engineering Attacks Your End Users Need to Know About
It's Cybersecurity Awareness Month. Make sure your users are briefed on these 10 attacker techniques that are often overlooked.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Security for the IoT

    In this webcast, experts discuss the most effective approaches to securing Internet-enabled systems and offer advice on monitoring and protecting next-generation IoT technology. Register today!

  • Ransomware: Latest Developments & How to Defend Against Them

    Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly are just around the corner. Learn how ransomware can affect your organization and steps you can take to defend your systems and users against ...

MORE WEBINARS

Partner Perspectives

CISOs: Striving Toward Proactive Security Strategies
A new survey paints a compelling picture of the modern security executive, how they succeed, and how much power they wield.

6 Steps to Finding Honey in the OWASP
The most famous project of the Open Web Application Security Project is getting an update. Here's what you need to know, and how you can get involved.

Can Machine Learning Outsmart Malware?
Using machine learning in the cybersecurity domain is a growing trend with many advantages, but it also has its risks.

FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.