Follow Dark Reading:
 February 15, 2018
LATEST SECURITY NEWS & COMMENTARY
Cyberattack Aimed to Disrupt Opening of Winter Olympics
Researchers who identified malware targeting the 2018 Winter Olympics say the attackers had previously compromised the Games' infrastructure.
Windows 10 Critical Vulnerability Reports Grew 64% in 2017
The launch and growth of new operating systems is mirrored by an increase in reported vulnerabilities.
Google Paid $2.9M for Vulnerabilities in 2017
The Google Vulnerability Reward Program issued a total of 1,230 rewards in 2017. The single largest payout was $112,500.
AI and Machine Learning: Breaking Down Buzzwords
Security experts explain two of today's trendiest technologies to explain what they mean and where you need them.
Tracking Bitcoin Wallets as IOCs for Ransomware
By understanding how cybercriminals use bitcoin, threat analysts can connect the dots between cyber extortion, wallet addresses, shared infrastructure, TTPs, and attribution.
Fake News: Could the Next Major Cyberattack Cause a Cyberwar?
In the way it undercuts trust, fake news is a form of cyberattack. Governments must work to stop it.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Nation-State Hacking Groups to Watch in 2018
The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.

One in Three SOC Analysts Now Job-Hunting
The more experienced a SOC analyst gets, the more his or her job satisfaction declines, a new survey of security operations center staffers shows.

Fileless Malware: Not Just a Threat, but a Super-Threat
Exploits are getting more sophisticated by the day, and cybersecurity technology just isn't keeping up.

MORE
EDITORS' CHOICE

Encrypted Attacks Continue to Dog Perimeter Defenses
Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.
FYI ON (ISC)2

Join Cybersecurity's Brightest Professionals

(ISC)² is an international, nonprofit membership association for security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 125,000 certified members strong, we empower the professionals who touch every aspect of cyber, information, software, IT and infrastructure security. With (ISC)² certification, you join a globally recognized family of cyber and IT security professionals. You’ll have access to broad array of exclusive resources, educational tools and peer-to-peer networking opportunities, conference and event discounts, and much more to you help strengthen your career while helping us accomplish our mission of inspiring a safe and secure cyber world.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Your Identity-aware Infrastructure

    Join Darran Rolls, the CTO & CISO of SailPoint, the leader in the Gartner Magic Quadrant for Identity Governance and Administration, as he demonstrates how to build an identity-aware infrastructure.

  • Strategies for Monitoring & Measuring Cloud Security

    In this Dark Reading webinar, a top expert offers a look at practices and tools that will help your team monitor security in IT environments that incorporate many cloud applications and services.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.