Follow Dark Reading:
 October 17, 2020
LATEST SECURITY NEWS & COMMENTARY
What's Really Happening in Infosec Hiring Now?
As the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.
An Uncommon 20 Years of Commonly Enumerating Vulns
Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list).
Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections
The state of email defenses has a role to play in the US presidential election.
What Is End-to-End Encryption?
Many services advertise E2EE, but not all of them actually offer it.
MORE NEWS & COMMENTARY
HOT TOPICS
Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.

Open Source Threat Intelligence Searches for Sustainable Communities
As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...

How to Pinpoint Rogue IoT Devices on Your Network
Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.

MORE
EDITORS' CHOICE

A 7-Step Cybersecurity Plan for Healthcare Organizations
With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.
Where are the 'Great Exits' in the Data Security Market?
If data security were a student, its report card would read "Not performing to potential." Here's why.
FROM THE NEWS DESK

US Counterintelligence Director & Fmr. Europol Leader Talk Election Security
The US counterintelligence lead joins a former Europol cyber chief to discuss modern election threats and the benefits of public-private collaboration.
Microsoft Office 365 Accounts a Big Target for Attackers
Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Dark Reading Virtual Event] Your Crash Course on Cyber Attackers

    This virtual event offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You'll get a look at some of the latest exploits used by today's cybercriminals, as well as their methods ...

  • Security Alert Fatigue: Tips for Taking Control

    Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.