Follow Dark Reading:
 April 08, 2021
LATEST SECURITY NEWS & COMMENTARY
Enterprises Remain Riddled With Overprivileged Users -- and Attackers Know It
Attackers commonly focus on finding users with too much privileged access as their ticket to network compromise. What can companies do?
LinkedIn Phishing Ramps Up With More-Targeted Attacks
Seeking to take advantage of out-of-work users, malware groups continue to use LinkedIn and business services to offer fictional jobs and deliver infections instead.
Did 4 Major Ransomware Groups Truly Form a Cartel?
An analysis of well-known extortion groups and their cryptocurrency transactions reveals the answer.
Inside the Ransomware Campaigns Targeting Exchange Servers
Security experts discuss the ransomware campaigns taking aim at Microsoft Exchange Server vulnerabilities patched last month.
Crime Service Gives Firms Another Reason to Purge Macros
Recent Trickbot campaigns and at least three common banking Trojans all attempt to infect systems using malicious macros in Microsoft Office documents created using EtterSilent.
Microsoft Teams, Exchange Server, Windows 10 Hacked in Pwn2Own 2021
The 2021 Pwn2Own is among the largest in its history, with 23 separate entries targeting 10 products.
FBI & CISA Warn of Active Attacks on FortiOS Vulnerabilities
A joint advisory warns admins of the likelihood of APT groups exploiting three vulnerabilities in the Fortinet FortiOS.
NFT Thefts Reveal Security Risks in Coupling Private Keys & Digital Assets
Compromised NFT accounts highlight security concerns inherent in the design of centralized systems.
MORE NEWS & COMMENTARY
HOT TOPICS
How to Build a Resilient IoT Framework
For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges.

7 Ways to Reduce Cyber Threats From Remote Workers
The pandemic's decline won't stop the work-from-home trend nor the implications for cybersecurity, so it's crucial to minimize the threats.

Ryuk's Rampage Has Lessons for the Enterprise
The Ryuk ransomware epidemic is no accident. The cybercriminals responsible for its spread have systematically exploited weaknesses in enterprise defenses that must be addressed.

MORE
EDITORS' CHOICE

7 Security Strategies as Employees Return to the Office
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal.
The Role of Visibility in Securing Cloud Applications
Traditional data center approaches aren't built for securing modern cloud applications.
LATEST FROM THE EDGE

9 Modern-Day Best Practices for Log Management
Log management is nothing new. But doing so smartly, correctly, and concisely in today's data-driven world is another story.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.