Email-borne attacks out of Russia have already targeted at least a few US and European organizations.
Follow Dark Reading:
 March 02, 2022
LATEST SECURITY NEWS & COMMENTARY
Cyberattacks in Ukraine Soon Could Spill Over to Other Countries
Email-borne attacks out of Russia have already targeted at least a few US and European organizations.
Beyond the Hype: AI's Future in Defensive Cybersecurity
Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
7 Steps to Take Right Now to Prepare for Cyberattacks by Russia
A lot of the recommended preparation involves measures organizations should have in place already.

Ransomware Adds New Wrinkle in Russian Cybercrime Market
Government crackdowns may destabilize Russian crime rings and strengthen their ties to Chinese allies.

Hidden Costs of a Data Breach
Don't consider just the initial costs. Hidden factors include remediation, revenue loss, reputational harm, national security — even human life.

MORE
EDITORS' CHOICE

Phishing Attack in Ukraine Could Be Prelude to Disinformation Campaign
Belarus-based APT behind the attacks may also be working in concert with Russia, researchers say.
LATEST FROM THE EDGE

What Do I Need to Know for SaaS Security?
Most importantly, someone needs to step forward and take it on as their job.
LATEST FROM DR TECHNOLOGY

Secure Web Browsers Tackle Ransomware, Insider Threat in Enterprises
Enterprise security teams can use secure Web browsers to apply controls and governance to cloud applications and customer data.

Tech Resources
ACCESS TECH LIBRARY NOW

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.