Follow Dark Reading:
 May 31, 2018
LATEST SECURITY NEWS & COMMENTARY
Dozens of Vulnerabilities Discovered in DoD's Enterprise Travel System
In less than one month, security researchers participating in the Pentagon's Hack the Defense Travel System program found 65 vulnerabilities.
Windows 'Double Kill' Attack Code Found in RIG Exploit Kit
Microsoft issued a fix for the remote code execution zero-day vulnerability in May, but research shows businesses have slowed their patching processes post-Meltdown.
Hacker Sentenced to 5 Years in Yahoo Credential Theft Case
Karim Baratov given prison time and seven-figure fine after guilty plea in the massive Yahoo data breach
FireEye Offers Free Tool to Detect Malicious Remote Logins
Open source GeoLogonalyzer helps to weed out hackers exploiting stolen credentials to log into their targets.
Machine Learning, Artificial Intelligence & the Future of Cybersecurity
The ability to learn gives security-focused AI and ML apps unrivaled speed and accuracy over their more basic, automated predecessors. But they are not a silver bullet. Yet.
Mobile Malware Moves to Mine Monero (and Other Currencies)
A new report shows that cryptocurrencies tend to be the focus of a growing number of malicious apps.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Free DevOps-Friendly Security Tools Developers Will Love
Start building an affordable DevSecOps automation toolchain with these free application security tools.

Over 5K Gas Station Tank Gauges Sit Exposed on the Public Net
One gas station failed its PCI compliance test due to security holes in its automated gas tank gauge configuration, researcher says.

Most Expensive Data Breaches Start with Third Parties: Report
Data breach costs increased 24% for enterprise victims and 36% for SMBs from 2017 to 2018, researchers found.

MORE
EDITORS' CHOICE

6 Ways Third Parties Can Trip Up Your Security
Poor access control, inadequate patch management, and non-existent DR practices are just some of the ways a third party can cause problems
Getting Revolutionary (Not Evolutionary) about Cybersecurity
Being a security revolutionary isn't purely about new, ground-breaking ideas. It's about anticipating, outpacing, and influencing your world, both internally and externally. Here are five keys to success.
Tech Resources

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.