Follow Dark Reading:
 May 04, 2021
LATEST SECURITY NEWS & COMMENTARY
Researchers Explore Active Directory Attack Vectors
Incident responders who investigate attacks targeting Active Directory discuss methods used to gain entry, elevate privileges, and control target systems.
Researchers Find Bugs Using Single-Codebase Inconsistencies
A Northeastern University research team finds code defects -- and some vulnerabilities -- by detecting when programmers used different code snippets to perform the same functions.
(Sponsored Article) Hunter-Gatherers in the Cybersecurity Jungle
Why complementing your SOC's ongoing CTI efforts with advanced threat-hunting analytics is a vital strategy for ensuring cyber resilience.
Stopping the Next SolarWinds Requires Doing Something Different
Will the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale?
Imperva to Buy API Security Firm CloudVector
The deal is intended to expand Imperva's API security portfolio, officials say.
Buer Malware Variant Rewritten in Rust Programming Language
Researchers suggest a few reasons why operators rewrote Buer in an entirely new language
Name That Edge Toon: Magical May
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS & COMMENTARY
HOT TOPICS
FluBot Malware's Rapid Spread May Soon Hit US Phones
The FluBot Android malware has spread throughout several European countries through an SMS package delivery scam.

Your Digital Identity's Evil Shadow
In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.

The Ticking Time Bomb in Every Company's Code
Developers must weigh the benefits and risks of using third-party code in Web apps.

MORE
EDITORS' CHOICE

Dark Reading Celebrates 15th Anniversary
Cybersecurity news site begins 16th year with plans to improve site, deliver more content on cyber threats and best practices.
7 Modern-Day Cybersecurity Realities
Security pros may be working with a false sense of security. We explore seven places where old methods and techniques have to change to keep their organizations safe.
LATEST FROM THE EDGE

Ghost Town Security: What Threats Lurk in Abandoned Offices?
Millions of office buildings and campuses were rapidly abandoned during the pandemic. Now it's a year later. What happened in those office parks and downtown ghost towns? What security dangers lurk there now, waiting to ambush returning businesses?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Web Security: Protecting Your Data from Internet Threats

    One of the most accessible methods of cracking your corporate data is through a simple Internet connection. In this webinar, experts offer a look at some of the most common ways that cyber attackers use to crack enterprise systems via ...

  • Making XDR Work in Your Enterprise - Dark Reading

    In this Dark Reading webinar, experts discuss the real-life implementation issues surrounding emerging detection and response technologies. You'll learn how these emerging technologies can be integrated with your existing cybersecurity tools, and how XDR technology might affect your cybersecurity operations ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.