Follow Dark Reading:
 April 13, 2020
LATEST SECURITY NEWS & COMMENTARY
Criminals Selling Videoconferencing Credentials on Dark Web
Two security firms find thousands of usernames and passwords for Zoom accounts for sale and warn that the shift to remote work is changing attackers' targets.
10 Ways to Spot a Security Fraud
There is no shortage of people presenting themselves as security experts. Some of them truly are. The others...
Only 40% of Small Business Owners Have a Cybersecurity Policy
Small business owners are concerned about cyberattacks targeting remote workers but lack the resources to invest in security.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
Chinese APT Groups Targeted Enterprise Linux Systems in Decade-Long Data Theft Campaign
Organizations across multiple industries compromised in a systematic effort to steal IP and other sensitive business data, BlackBerry says.

Microsoft: Emotet Attack Shut Down an Entire Business Network
The infection started with a phishing email and spread throughout the organization, overheating all machines and flooding its Internet connection.

The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Criminal, political, and strategic factors are combining to create a perfect storm of cyber infections that target the global supply chain.

MORE
EDITORS' CHOICE

8 Phishing Lures Preying on Pandemic Panic
Phishing campaigns and scams are skyrocketing to take advantage of people concerned about COVID-19 impacts. Here are some key examples in action.
Schneier on Hacking Society
How the hacker mindset and skill set could play a role in improving and securing societal systems, according to renowned security technologist Bruce Schneier.
NEW FROM THE EDGE

When All Behavior Is Abnormal, How Do We Detect Anomalies?
Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects of life, is it possible to build baselines and measure normal patterns when nothing at all seems normal?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Chatbots for the Enterprise

    In this webinar, you'll learn how enterprise software agents are delivering answers to customer and employee questions today, see how conversational AI can free IT, HR, and call center staffers and others from mundane, repetitive tasks, and get guidance on ...

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.