The maintainer of a widely used npm module served up an unwelcome surprise for developers.
Follow Dark Reading:
 March 21, 2022
LATEST SECURITY NEWS & COMMENTARY
Code-Sabotage Incident in Protest of Ukraine War Exposed Open Source Risks
The maintainer of a widely used npm module served up an unwelcome surprise for developers.
Satellite Networks Worldwide at Risk of Possible Cyberattacks, FBI & CISA Warn
Agencies provide mitigation steps to protect satellite communication (SATCOM) networks amid "current geopolitical situation."
A Chance to Raise Shields Right
CISA's "Shields Up" alert provides urgency — and opportunity — for supply chain conversations.
The Road Ahead for Cyber and Infrastructure Security
Despite cost, it's time to focus on securing legacy systems and physical infrastructure along with digital systems.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
What the Newly Signed US Cyber-Incident Law Means for Security
Bipartisan cybersecurity legislation comes amid increased worries over ransomware, and fears of cyberattacks from Russia in the wake of its invasion of Ukraine.

Stopping Russian Cyberattacks at Their Source
Step up training with cybersecurity drills, teach how to avoid social engineering traps, share open source monitoring tools, and make multifactor authentication the default.

Cut Down on Alert Overload and Leverage Layered Security Measures
Feeling overwhelmed by the number of alerts? It doesn't have to be that way.

MORE
EDITORS' CHOICE

6 Reasons Not to Pay Ransomware Attackers
Paying a ransom might appear to be the best option, but it comes with its own costs.
LATEST FROM THE EDGE

Security Teams Struggle to Get Started With Zero Trust
Nearly a third of respondents in a Dark Reading survey on endpoint security strategy say zero trust is too confusing to implement.
LATEST FROM DR TECHNOLOGY

Half of Orgs Use Web Application Firewalls to Paper Over Flaws
WAFs remain a popular backfill for complex and fraught patch management.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How To Get Ahead Of The Security Data Curve -- And Stay There

    Security teams are overwhelmed with incident data, alerts, and log files. Each endpoint and each application generates its own set of data. How are security teams supposed to make sense of all the data they have? In this webinar, experts ...

  • Rethinking Asset Management to Improve Enterprise Security

    One common reason behind many enterprise security breaches is that attackers found a system, application, or device that security teams didn't know they had. Attackers can tamper with these unknown systems to make them look legitimate, and security defenders may ...

MORE WEBINARS
FEATURED REPORTS
  • Rethinking Endpoint Security in a Pandemic and Beyond

    IT security teams are expending the concept of "endpoint security" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple ...

  • How Enterprises Are Assessing Cybersecurity Risk in Today's Environment

    Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.