Follow Dark Reading:
 October 10, 2020
LATEST SECURITY NEWS & COMMENTARY
Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.
Open Source Threat Intelligence Searches for Sustainable Communities
As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...
Rethinking Email Security in the Face of Fearware
E-mail messages preying on fear have ramped up since the COVID-19 outbreak, raising questions about security's reliance on historical data about past attacks to predict the future
'Virtual Cyber Carnival' Kicks off Cybersecurity Awareness Month
A new initiative will run throughout the month of October, invites the general public to play cybersecurity games (and win fabulous prizes).
Name That Toon: Castle in the Sky
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS & COMMENTARY
HOT TOPICS
Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats
Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.

New Research Finds Bugs in Every Anti-Malware Product Tested
Products from every vendor had issues that allowed attackers to elevate privileges on a system -- if they already were on it.

Meet 'Egregor,' a New Ransomware Family to Watch
Egregor's operators promise to decrypt victims' files and provide security recommendations in exchange for ransom payment.

MORE
EDITORS' CHOICE

6 Best Practices for Using Open Source Software Safely
Open source software is critical yet potentially dangerous. Here are ways to minimize the risk.
Why MSPs Are Hacker Targets, and What To Do About It
Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.
FROM THE DARK READING NEWS DESK

CISOs Planning on Bigger Budgets: Report
Budgets are on the rise, even in a time of revenue worries across the industry.
Critical Zerologon Flaw Exploited in TA505 Attacks
Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.