Follow Dark Reading:
 March 12, 2021
LATEST SECURITY NEWS & COMMENTARY
F5 Networks Urges Customers to Update to New Versions of Its App Delivery Tech
F5 BIG-IP and BIG-IQ have multiple critical vulnerabilities that enable attackers to completely compromise systems.
Microsoft Exchange Server Exploit Code Posted to GitHub
The proof-of-concept tool, which contained exploits for two Exchange Server vulnerabilities, was quickly removed from GitHub.
Network Pivots, Patch Bypasses: Exploits Hit Hard in 2020
An analysis of 50 vulnerabilities finds a spectrum of risk, from widespread vulnerabilities exploited by a variety of attackers to serious issues that will likely be exploited in 2021.
Molson Coors Beer Operations Halted by Hack
No details yet disclosed on the cyberattack.
5 Steps for Investigating Phishing Attacks
Phishing is a common and effective cybercrime tool, but even the most sophisticated threat actors make mistakes that you can leverage in your investigations.
Actionable Tips for Engaging the Board on Cybersecurity
Up your game with your company's board of directors to help them understand your cybersecurity priorities.
MORE NEWS & COMMENTARY
HOT TOPICS
Malware Operator Employs New Trick to Upload Its Dropper into Google Play
Check Point researchers recently discovered the Clast82 dropper hidden in nine legitimate Android utility apps.

Multiple Attack Groups Exploited Microsoft Exchange Flaws Prior to the Patches
Researchers have spotted multiple groups exploiting the zero-day Exchange server vulnerabilities.

Look to Banking as a Model for Stopping Crime-as-a-Service
The first step toward prevention is understanding the six most common CaaS services.

MORE
EDITORS' CHOICE

5 Ways Social Engineers Crack Into Human Beings
These common human traits are the basic ingredients in the con-man's recipe for trickery.
Hiding in Plain Sight: Protecting Enterprises from the 'New' Shadow IT
Three steps to fight this increasingly vexing problem.
LATEST FROM THE EDGE

Does XDR Mark the Spot? 6 Questions to Ask
Extended detection and response technology goes well beyond endpoint management to provide visibility into networks, servers, cloud, and applications. Could it be the answer to your security challenges?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Drafting a Data Breach Response Playbook

    The cyber attackers hit their mark, and your sensitive databases have been breached: now what do you do? Whom should you call first? In this webinar, learn what processes and procedures, tools and techniques should go into your data breach ...

  • The Failures of Static DLP and How to Protect Against Tomorrow's Email Breaches

    In the last 12 months, 93% of organizations experienced security incidents where email use has put sensitive data at risk. Join this webinar to learn the impact of the COVID-19 pandemic on email security and remote working, the limitations of static DLP ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.