Follow Dark Reading:
 May 01, 2019
LATEST SECURITY NEWS & COMMENTARY
Database Leaks, Network Traffic Top Data Exfiltration Methods
Intellectual property and personally identifiable information tie for the type of data IT practitioners are worried about losing.
Financial Data for Multiple Companies Dumped Online in Failed Extortion Bid
Potential victims reportedly include Oracle, Volkswagen, Airbus and Porsche.
Threat Intelligence Firms Look to AI, but Still Require Humans
Machine learning and artificial intelligence are helping threat-intelligence firms cover a greater area of the darknet, but human analysts will always be necessary, experts say.
Microsoft 365 Updated with New Compliance, Encryption, Privacy Controls
New tools, such as Compliance Manager and Advanced Message Encryption, aim to give businesses more options for data privacy.
California Consumer Privacy Act: 4 Compliance Best Practices
Companies that get ahead of the January 2020 data privacy deadline can minimize the risk of sanctions and also gain a competitive advantage in the marketplace.
Researchers Explore Remote Code Injection in macOS
Deep Instinct analysts test three code injection methods and a custom-built Mach-O loader to load malicious files from memory.
Confluence Vulnerability Opens Door to GandCrab
An exploit of the vulnerability offers attackers a ransomware surface that doesn't need email.
MORE NEWS & COMMENTARY
HOT TOPICS
How to Build a Cloud Security Model
Security experts point to seven crucial steps companies should be taking as they move data and processes to cloud environments.

New Twist in the Stuxnet Story
What a newly discovered missing link to Stuxnet and the now-revived Flame cyber espionage malware add to the narrative of the epic cyber-physical attack.

How a Nigerian ISP Accidentally Hijacked the Internet
For 74 minutes, traffic destined for Google and Cloudflare services was routed through Russia and into the largest system of censorship in the world, China's Great Firewall.

MORE
EDITORS' CHOICE

7 Types of Experiences Every Security Pro Should Have
As the saying goes, experience is the best teacher. It'll also make you a better and more well-rounded security pro.
How to Help Your Board Navigate Cybersecurity's Legal Risks
What's worse than a massive data breach? A massive data breach followed by a shareholder derivative lawsuit. Learn what's at stake and what CISOs can do to mitigate the damage.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Becoming a Threat Hunter in your Enterprise

    Hear as a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.

  • End-User Security Awareness Programs That Work

    Imagine your users could be the security department's eyes and ears--the first to alert you to a potential threat. In this webinar learn how to create an end-user security awareness program that engages your users, builds a security culture, and ...

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.