Follow Dark Reading:
 June 12, 2020
LATEST SECURITY NEWS & COMMENTARY
FBI Says Sudden Increase in Mobile Banking Is Heightening Risks For Users
Mobile malware and fake apps purporting to be legitimate banking software are big risks, law enforcement agency says.
ICS Threat Snake Ransomware Suspected in Honda Attack
An attack targeting the automaker reportedly infected internal servers and led to the suspension of production at plants around the world.
Attack Surface Area Larger Than Most Businesses Believe
Workers are not the only outside-the-perimeter security risk. Companies have a variety of vulnerable Internet-facing resources exposing their business to risk, study finds.
Siemens Teams Up in OT Endpoint Security
Machine language-based endpoint security collaboration with SparkCognition is the latest move by Siemens in security.
What COVID-19 Teaches Us About Social Engineering
Unless we do something proactively, social engineering's impact is expected to keep getting worse as people's reliance on technology increases and as more of us are forced to work from home.
'Highly Active' APT Group Targeting Microsoft Office, Outlook
The Gamaredon group has ramped up activity in recent months and makes no effort to stay under the radar, researchers report.
Protocol Vulnerability Threatens Mobile Networks
A vuln in the GTP protocol could allow DoS, fraud, and data theft attacks against cellular networks from virtually anywhere.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Fixes 129 Bugs in Largest Patch Tuesday Release
The June release of security updates addresses several remote code execution vulnerabilities in SharePoint, Excel, Windows OLE, and other services.

Q&A: Eugene Spafford on the Risks of Internet Voting
Allowing people to cast their ballots online to circumvent coronavirus-related health concerns introduces problems that we simply don't know how to manage, says the Purdue University professor and security leader.

Vulnerability in Plug-and-Play Protocol Puts Billions of Devices at Risk
"CallStranger" flaw in UPnP allows attackers to launch DDoS attacks and scan internal ports, security researcher says.

MORE
EDITORS' CHOICE

What Usability Means to Security Pros
The last thing cybersecurity executives and practitioners need are even more tools that are difficult to operate. Here's what they look for when assessing new tools.
The Hitchhiker's Guide to Web App Pen Testing
Time on your hands and looking to learn about web apps? Here's a list to get you started.
NEW FROM THE EDGE

Asset Management Mess? How to Get Organized
Hardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure it.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Data In Motion & the New Normal

    The winding down of COVID-19 has everyone pondering The New Tomorrow, and no doubt you will be reviewing the state of your current networks and networking plans created previously. This likely means transforming your network architectures and security strategies, which ...

  • Building & Managing the Next-Gen SOC

    In this webinar, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today's most current threats and online exploits.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.