Follow Dark Reading:
 April 08, 2020
LATEST SECURITY NEWS & COMMENTARY
Chinese APT Groups Targeted Enterprise Linux Systems in Decade-Long Data Theft Campaign
Organizations across multiple industries compromised in a systematic effort to steal IP and other sensitive business data, BlackBerry says.
Cybercriminals Hide Malware & Phishing Sites Under SSL Certificates
More than half of the top 1 million websites use HTTPS, researchers report, but not all encrypted traffic is safe.
Privacy & Digital-Rights Experts Worry Contact-Tracing Apps Lack Limits
Mobile-phone-based tracking of people can help fight pandemics, but privacy and security researchers stress that it needs to be done right.
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Criminal, political, and strategic factors are combining to create a perfect storm of cyber infections that target the global supply chain.
Using Application Telemetry to Reveal Insider & Evasive Threats
Data from application processes and other systems leave a trail of threat crumbs that can be used to detect and shut down attacks.
71% of Security Pros See Threats Jump Since COVID-19 Outbreak
Phishing is the top threat, followed by websites offering false information about the pandemic, malware, and ransomware attacks.
Mature DevOps Teams Are Secure DevOps Teams
New research shows the relationship between mature DevOps processes, secure applications, and happy developers.

COVID-19 Omdia Analyst Advisory: Security

A list of free security products and services developed for Dark Reading by Omdia analysts to help you meet the challenges of COVID-19.


MORE NEWS & COMMENTARY
HOT TOPICS
Active Directory Attacks Hit the Mainstream
Understanding the limitations of authentication protocols, especially as enterprises link authentication to cloud services to Active Directory, is essential for security teams in the modern federated enterprise.

Phishers Try 'Text Direction Deception' Technique to Bypass Email Filters
With COVID-19 concerns running high, attackers are trying new tactics to get to users.

Vulnerability Researchers Focus on Zoom App's Security
With videoconferencing's rise as an essential tool for remote work comes a downside: more security scrutiny, which has turned up a number of security weaknesses.

MORE
EDITORS' CHOICE

9 Security Podcasts Worth Tuning In To
Recommendations for podcasts discussing news, trends, guidance, and stories across the cybersecurity industry.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
NEW FROM THE EDGE

How Do I Make Sure My Work-From-Home Users Install Updates?
Most enterprise endpoint solutions will support policies to enforce recommended updates.
The Edge Names 'Holy Cow' Cartoon Caption Winners
What can cows possibly have to do with cybersecurity?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Fighting Cybercrime in a Pandemic Threat Landscape

    In this webinar, you will learn about Evidence of Compromise, a new approach to cyber risk management that gives you unprecedented visibility into your entire third-party ecosystem, so you can prioritize active compromises, not hypothetical vulnerabilities.

  • Building a Strategy for Detection and Response

    Hear as top industry experts discuss how to create a strategy that enables the enterprise security team to do detection and response across a wide variety of technologies and services.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.