Follow Dark Reading:
 November 17, 2021
LATEST SECURITY NEWS & COMMENTARY
Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.
4 Considerations for Improving Cloud Security Hygiene
Mixing cloud security and maintenance practices with legacy enterprise approaches usually ends up shortchanging cloud hygiene. Here are some ways to remedy that.
Navigating the Complexity of Today's Digital Supply Chain
An efficient way to monitor security is to model user behavior using time series data and watching for anomalies.
Emotet Makes a Comeback
The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
The Troubling Rise of Initial Access Brokers
Criminal groups are ramping up use of IABs to get access to networks without having to deal with the initial reconnaissance and intrusion phases.

How to Hire — and Retain — Effective Threat Hunters
Key characteristics that should be evaluated include curiosity, disposition, and fit with the culture.

'Lyceum' Threat Group Broadens Focus to ISPs
New report suggests attacker is targeting trusted supply chain companies in order to compromise large numbers of downstream customers.

MORE
EDITORS' CHOICE

How to Negotiate With Ransomware Attackers
Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.
LATEST FROM THE EDGE

Suppliers, Cloud Providers Are Threats to Enterprise Data, Survey Says
Other threats to enterprise data include cybercriminals, authorized users, foreign governments, and application vulnerabilities, according to Dark Reading's recent Strategic Security Report.
LATEST FROM DR TECHNOLOGY

Team Cymru Acquires Amplicy
The combination of Team Cymru's threat intelligence and threat hunting capabilities and Amplicy's Internet asset discovery and vulnerability management will give enterprise defenders a comprehensive view of their organization's cyber risk.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.