Follow Dark Reading:
 June 01, 2021
LATEST SECURITY NEWS & COMMENTARY
Chinese APT Groups Continue to Pound Away on Pulse Secure VPNs
Security vendor says it has observed threat groups using a set of 16 tools specifically designed to attack Pulse Secure devices since April 2020.
SolarWinds Attackers Impersonate USAID in Advanced Email Campaign
Microsoft shares the details of a wide-scale malicious email campaign attributed to Nobelium, the group linked to the SolarWinds supply chain attack.
Plug-ins for Code Editors Pose Developer-Security Threat
There are two critical vulnerabilities in plug-ins for the popular Visual Studio Code editor, now patched, but security firm Snyk warns that popular plug-ins could put development environments in jeopardy.
3 SASE Misconceptions to Consider
SASE is all the rage, promising things IT leaders have long dreamed about, but a purist approach may create consequences.
(Sponsored Article) 4 Rules for Web App and API Protection
We can't delay the adoption of new rules that respect the way modern applications are built.
Most Mobile Apps Can Be Compromised in 15 Minutes or Less
In the name of releasing apps quickly and delivering a smooth user experience, mobile app security is often given short shrift.
Modern SOCs a 'Painful' Challenge Amid Growing Complexity: Report
A new study examines the tools and technologies driving investment and activities for security operations centers.
Siemens Patches Major PLC Flaw that Bypasses Its 'Sandbox' Protection
Researchers from Claroty today detailed the memory vuln they discovered in Siemens SIMATIC S7-1200 and S7-1500 PLCs.
MORE NEWS & COMMENTARY
HOT TOPICS
Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks
Security researchers at Mandiant have seen an increasing wave of relatively simplistic attacks involving ICS systems - and attackers sharing their finds with one another - since 2020.

Your Network's Smallest Cracks Are Now Its Biggest Threats
Bad actors have flipped the script by concentrating more on low-risk threats. Here's how to address the threat and the tactics.

The Makings of a Better Cybersecurity Hire
Experience counts, but as one CISO has learned, don't overlook a creative, motivated candidate just because their background doesn't match the job description.

MORE
EDITORS' CHOICE

Let's Stop Blaming Employees for Our Data Breaches
Assuming employees want to steal trade secrets pits them against your security teams, creates stress and reduces productivity.
New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks
The Agrius group's focus appears to be Israel and the Middle East.
LATEST FROM THE EDGE

A Wrench and a Screwdriver: Critical Infrastructure's Last, Best Lines of Defense?
Critical infrastructure's cybersecurity problems are complex, deep-rooted, and daunting. Addressing them won't be easy...but it isn't impossible.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Smarter Security Automation for Streamlined SecOps

    A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? How does emerging automation ...

  • Ransomware Resilience and Response Playbook

    When ransomware locks up your business's critical data and essential gear, panic can set in fast-which just makes you more vulnerable. But questions abound: is this a ransomworm that's going to spread to other endpoints? Are the attackers going to ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.