Follow Dark Reading:
 October 01, 2018
LATEST SECURITY NEWS & COMMENTARY
Exclusive: Cisco, Duo Execs Share Plans for the Future
Cisco's Gee Rittenhouse and Duo's Dug Song offer ideas and goals for the merged companies as Duo folds under the Cisco umbrella.
Facebook Hacked, 50 Million Users Affected
A vulnerability in Facebook's "View As" feature let attackers steal security tokens linked to 50 million accounts, the company confirms.
'Torii' Breaks New Ground For IoT Malware
Stealth, persistence mechanism and ability to infect a wide swath of devices make malware dangerous and very different from the usual Mirai knockoffs, Avast says.
4 Traits of a Cyber-Resilient Culture
Companies with a solid track record of cybersecurity share these practices and characteristics.
How Data Security Improves When You Engage Employees in the Process
When it comes to protecting information, we can all do better. But encouraging a can-do attitude goes a long way toward discouraging users' risky behaviors.
FBI IC3 Warns of RDP Vulnerability
Government agencies remind users that RDP can be used for malicious purposes by criminal actors.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Dark Web Pricing Trends
For cybercriminals, the Dark Web grows more profitable every day.

The Cyber Kill Chain Gets a Makeover
A new report demonstrates how the cyber kill chain is consolidating as criminals find ways to accelerate the spread of their targeted cyberattacks.

Critical Linux Kernel Flaw Gives Root Access to Attackers
All versions of Red Hat Enterprise Linux, CentOS vulnerable to 'Mutagen Astronomy' flaw, according to Qualys.

MORE
EDITORS' CHOICE

7 Most Prevalent Phishing Subject Lines
The most popular subject lines crafted to trick targets into opening malicious messages, gleaned from thousands of phishing emails.
Mirai Authors Escape Jail Time - But Here Are 7 Other Criminal Hackers Who Didn't
Courts are getting tougher on the cybercrooks than some might realize.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Lambda Architecture with In-Memory Technology

    To meet existing and future needs, organizations need a new kind of data warehouse that can handle both kinds of data processing: batch workloads for traditional reporting, as well as real-time or near-real-time streaming data. For this, they need a ...

  • Want Security in the Cloud? Look to Identity 1st

    All the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and ...

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • How Data Breaches Affect the Enterprise

    This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.