Follow Dark Reading:
 June 21, 2018
LATEST SECURITY NEWS & COMMENTARY
China-Based Cyber Espionage Campaign Targets Satellite, Telecom, Defense Firms
Threat group Thrip is using three computers based in China to steal data from targeted companies in Southeast Asia and the US, Symantec says.
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Hackers are using the infrastructure, meant to transmit data between applications, for command and control.
Inside a SamSam Ransomware Attack
Here's how hackers use network tools and stolen identities to turn a device-level compromise into an enterprise-level takedown.
Improving the Adoption of Security Automation
Four barriers to automation and how to overcome them.
Alphabet Launches VirusTotal Monitor to Stop False Positives
Alphabet's Chronicle security division releases VirusTotal Monitor, a tool for developers to check if their product will be flagged as malware.
MORE NEWS & COMMENTARY
HOT TOPICS
How to Prepare for 'WannaCry 2.0'
It seems inevitable that a more-powerful follow-up to last year's malware attack will hit sooner or later. You'd better get prepared.

Tesla Employee Steals, Sabotages Company Data
The electric carmaker is the victim of an "extensive and damaging" insider attack, says CEO Elon Musk.

Trump-Kim Meeting Was a Magnet For Russian Cyberattacks
Attacks directed at targets in Singapore went through the roof earlier this week.

MORE
EDITORS' CHOICE

The Best and Worst Tasks for Security Automation
As with all new tech, there are good times and and bad times to use it. Security experts share which tasks to prioritize for automation.
Intel VP Talks Data Security Focus Amid Rise of Blockchain, AI
Intel vice president Rick Echevarria discusses the challenges of balancing data security with new technologies like blockchain and artificial intelligence.
Tech Resources

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.