Follow Dark Reading:
 August 18, 2021
LATEST SECURITY NEWS & COMMENTARY
Critical Vulnerability Affects Millions of IoT Devices
CISA, Mandiant, and ThroughTek share the details of a vulnerability that could allow attackers to observe camera feeds and remotely control devices.

Zero-Day Flaw Found in Fortinet's FortiWeb WAF Technology

Vendor says it plans to have a patch for the vulnerability by this weekend.


Metrics That Matter: A Guide to Enhancing Security Reporting
Are your reports neglected or ignored? Up your game around the metrics you use to measure protection.
It's Not Your Imagination: API and Web Security Is Getting Harder
With today's pace of rapid change, security must live everywhere that apps and APIs reside, and organizations can no longer rely on tools that weren't built with the decentralized enterprise in mind.
'BadAlloc' Vuln Affects Devices Using Older BlackBerry QNX Products
CISA warns organizations with devices running affected QNX-based systems to "immediately apply mitigations" to protect them.
Phishing Costs Reach New High of $14.8M: Report
Research finds phishing costs have quadrupled in recent years, costing companies millions of dollars and thousands of hours in wasted time.
MORE NEWS & COMMENTARY
HOT TOPICS
Contain a Ransomware Attack Before It Spreads
While ransomware attacks can be difficult to proactively prevent, enterprises can stop them from spreading and avoid extensive damage by implementing several key defensive measures.

Cost of Cyberattacks Significantly Higher for Smaller Healthcare Organizations
Significant oversights, such as lack of automation and continued vulnerability to old threats, leave healthcare organizations at risk.

14 Vulnerabilities Found in Widely Used TCP/IP Stack
"Infra:Halt" flaws in NicheStack impact potentially millions of devices used in OT and industrial control system environments, analysts say.

MORE
EDITORS' CHOICE

Troubling New Disk-Level Encryption Ransomware Surfaces
"DeepBlueMagic" also deletes Volume Shadow copy for Windows, making recovery all but impossible without a decryption key.
7 Steps to a More Secure Social Media Policy
Social media accounts must be viewed as part of the IT and security infrastructure. Follow these tips for developing a workable social media security program at your company.
LATEST FROM THE EDGE

NIST Misses Opportunity With New 'Minimum Standard' for Software Security Testing
The agency's response to President Biden's executive order creates serious, unresolved questions across the required techniques.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.