Follow Dark Reading:
 June 12, 2019
LATEST SECURITY NEWS & COMMENTARY
FBI Warns of Dangers in 'Safe' Websites
Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.
Cross-Site Scripting Errors Continue to Be Most Common Web App Flaw
In vulnerability disclosure programs, organizations are paying more in total for XSS issues than any other vulnerability type, HackerOne says.
Suppliers Spotlighted After Breach of Border Agency Subcontractor
Attackers increasingly use third-party service providers to bypass organizations' security. The theft of images from US Customs and Border Protection underscores the weakness suppliers can create.
Microsoft Issues Fixes for 88 Vulnerabilities
Four of the flaws are publicly known but none have been listed as under active attack.
Getting Up to Speed on Magecart
Greater awareness of how Magecart works will give your company a leg up on the growing threat from this online credit card skimmer. Here are four places to start.
'Have I Been Pwned' Is Up for Sale
Troy Hunt, who has been running HIBP solo for six years, launched "Project Svalbard" so the site can evolve with more resources, funding, and support.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Security Scams Set to Sweep This Summer
Experts share the cybersecurity threats to watch for and advice to stay protected.

Dark Web Becomes a Haven for Targeted Hits
Malware on the Dark Web is increasingly being customized to target specific organizations and executives.

The Minefield of Corporate Email
Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.

MORE
EDITORS' CHOICE

7 Container Components That Increase a Network's Security
A proof of concept at Interop19 showed just how simple a container deployment can be.
What 3 Powerful GoT Women Teach Us about Cybersecurity
Imagine Game of Thrones' Daenerys Targaryen, Arya Stark, and Cersei Lannister on the front lines in the real-world battleground of enterprise security.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How to Improve Enterprise Defense Using Network Segmentation and Microsegmentation

    In this Dark Reading webinar, experts discuss methods for using network segmentation and microsegmentation as part of your organization's strategy for limiting the effects of an online compromise.

  • Cybersecurity Automation 101

    Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.