Follow Dark Reading:
 January 09, 2020
LATEST SECURITY NEWS & COMMENTARY
DHS Warns of Potential Iranian Cyberattacks
Recent US military action in Baghdad could prompt retaliatory attacks against US organizations, it says.
Developers Still Don't Properly Handle Sensitive Data
The top classes of vulnerabilities for 2019 indicate that developers still don't correctly sanitize inputs, nor protect passwords and keys as they should.
Widely Known Flaw in Pulse Secure VPN Being Used in Ransomware Attacks
New Year's Eve attack on currency exchange service Travelex may have involved use of the flaw.
Ransomware Victim Southwire Sues Maze Operators
Attackers demanded $6 million from the wire and cable manufacturer when they launched a December ransomware campaign.
Organizations May 'Uncloud' Over Security, Budgetary Concerns
While most cloud vendors forecast continued adoption and growth, some customers are taking a harder look at the cloud services they're using
Fraud in the New Decade
Like any enterprise that wants to survive, fraudsters and hackers will continue to build on past successes to fuel future growth
MORE NEWS & COMMENTARY
HOT TOPICS
The Coolest Hacks of 2019
A FaceTime fail, weaponized sound, a 'Prying Eye,' and a wearable fingerprint ring, were among the more novel and odd hacks this year.

How AI and Cybersecurity Will Intersect in 2020
Understanding the new risks and threats posed by increased use of artificial intelligence.

New Standards Set to Reshape Future of Email Security
Emerging specs and protocols expected to make the simple act of opening an email a less risky proposition

MORE
EDITORS' CHOICE

6 Security Team Goals for DevSecOps in 2020
Huge opportunities await security teams that are finally ready move the needle on security problems that have plagued organizations for years.
Client-Side JavaScript Risks & the CCPA
How California's new privacy law increases the liability for securing Web-facing user data, and what enterprises can do to mitigate their risk.
NEW FROM THE EDGE

In App Development, Does No-Code Mean No Security?
No-code and low-code development platforms are part of application development, but there are keys to making sure that they don't leave security behind with traditional coding.
What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?
Misconfigured cloud buckets leak sensitive data. Here's how to keep your Amazon Web Services (AWS) Simple Server Storage (S3) buckets secured.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.