Follow Dark Reading:
 August 06, 2021
LATEST SECURITY NEWS & COMMENTARY
CISA Launches JCDC, the Joint Cyber Defense Collaborative
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
HTTP/2 Implementation Errors Exposing Websites to Serious Risks
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
Incident Responders Explore Microsoft 365 Attacks in the Wild
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
Researchers Find Significant Vulnerabilities in macOS Privacy Protections
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.

Top 5 Techniques Attackers Use to Bypass MFA

Like other protective measures, multifactor authentication isn't failsafe or foolproof.


4 Common Challenges of 'Shift Left' Security
Involving security in the earliest stages of software development helps prevent defects, but it's not without problems.
Prophet Spider Exploits WebLogic CVEs to Enable Ransomware Attacks
The group target unpatched Oracle WebLogic servers to gain access that they later hand off to third parties who deploy ransomware.
VC Firm Advanced Technology Ventures Hit with Ransomware
The venture capital firm believes the attack affected personal data belonging to individual investors in ATV funds.
MORE NEWS & COMMENTARY
HOT TOPICS
Why Supply Chain Attacks Are Destined to Escalate
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.

Think Having Avoided Kaseya Means You're Safe? Guess Again
The lesson: Don't assume that everything coming from an apparently benign source is safe.

Let the Security Facts Speak for Themselves
Five ways sticking to the facts is good for an organization’s security posture.

MORE
EDITORS' CHOICE

Dark Reading Virtual News Desk Returns to Black Hat

Coming to you prerecorded from home offices around the world!


5 Key Lessons From ICS Attacks Through the Ages
Industrial control systems attacks are happening with more frequency, but they are hardly new.
LATEST FROM THE EDGE

5 Things Incident Responders Wish CISOs Would Prioritize
What's on the incident responder's wish list? If CISOs prioritized these five issues, it would help make security response a whole lot more effective.
Tech Resources
ACCESS TECH LIBRARY NOW

  • External Threat Hunting - Reduce Supply Chain Risk

    In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ...

  • Two Sides of the PAM Coin

    There are two sides of the PAM (Privileged Access Management) Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches, but don't stop there! We ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.