Follow Dark Reading:
 January 15, 2019
LATEST SECURITY NEWS & COMMENTARY
Cryptomining Continues to Be Top Malware Threat
Tools for illegally mining Coinhive, Monero, and other cryptocurrency dominate list of most prevalent malware in December 2018.
Advanced Phishing Scenarios You Will Most Likely Encounter This Year
In 2019, there will be no end in sight to email-driven cybercrime such as business email compromise, spearphishing, and ransomware.
Facebook Faces Action From German Watchdog
German antitrust regulators prepare to require changes from Facebook regarding privacy and personal information.
Radiflow: New Approach for Classifying OT Attack Flaws
The firm says risk assessment should begin with understanding attacker taxonomy and continue with vulnerability analysis.
MORE NEWS & COMMENTARY
HOT TOPICS
DNS Hijacking Campaign Targets Organizations Globally
A group believed to be operating out of Iran has manipulated DNS records belonging to dozens of firms in an apparent cyber espionage campaign, FireEye says.

6 Ways to Beat Back BEC Attacks
Don't assume your employees know how to spot business email compromises - they need some strong training and guidance on how to respond in the event of an attack.

How Intel Has Responded to Spectre and Meltdown
In a newly published editorial and video, Intel details what specific actions it has taken in the wake of the discovery of the CPU vulnerabilities.

MORE
EDITORS' CHOICE

6 Serverless and Containerization Trends CISOs Should Track
Security leaders must stay on top of a fast-moving world of cloud deployment options.

Name that Toon: A Dog's Life

We provide the cartoon. You write the caption! Enter to win a $25 Amazon gift card.


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.