The White House urged operators of water and wastewater systems to review and beef up their security controls against attacks by Iran- and China-based groups.
Follow Dark Reading:
 March 21, 2024
LATEST SECURITY NEWS & COMMENTARY
Federal Warning Highlights Cyber Vulnerability of US Water Systems
The White House urged operators of water and wastewater systems to review and beef up their security controls against attacks by Iran- and China-based groups.
'Fluffy Wolf' Spreads Meta Stealer in Corporate Phishing Campaign
Unsophisticated threat actor is targeting Russian companies with both readily available malware and authentic software.
After LockBit, ALPHV Takedowns, RaaS Startups Go on a Recruiting Drive
Law enforcement action hasn't eradicated ransomware groups, but it has shaken up the cyber underground and sown distrust among thieves.
Tax Hackers Blitz Small Business With Phishing Emails
Armed with little more than an email address, scammers are trying to trick small businesses and the self employed into giving up Social Security numbers.
Connectivity Standards Alliance Meets Device Security Challenges With a Unified Standard and Certification
The new IoT Device Security Specification 1.0, with accompanying certification, aims to offer a unified industry standard and increase consumer awareness.
AI Won't Solve Cybersecurity's Retention Problem
To fix retention and skills gaps, we need to encourage more women and minorities to build careers in cybersecurity.
India's Android Users Hit by Malware-as-a-Service Campaign
Hackers are seeking sensitive personal information on user devices, including banking data and SMS messages.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Fortra Releases Update on Critical Severity RCE Flaw
The flaw has a CVSS rating of 9.8, and the company recommends product upgrades to fix the issue.

5 Ways CISOs Can Navigate Their New Business Role
CISOs can successfully make their business operations more secure and play a larger role in the organization's overall strategy, but there are pitfalls to avoid, Forrester analysts warn.

The New CISO: Rethinking the Role
Rising cybersecurity demands are changing the role of the head security officer. CISOs need to make a list, check it at least twice, and document every step.

Name That Toon: Bridge the Gap
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
'Conversation Overflow' Cyberattacks Bypass AI Security to Target Execs
Credential-stealing emails are getting past artificial intelligence's "known good" email security controls by cloaking malicious payloads within seemingly benign emails. The tactic poses a significant threat to enterprise networks.
LATEST FROM THE EDGE

Don't Answer the Phone: Inside a Real-Life Vishing Attack
Successful attackers focus on the psychological manipulation of human emotions, which is why anyone, even a tech-savvy person, can become a victim.
LATEST FROM DR TECHNOLOGY

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK
Ensuring that traffic visibility covers both client-server and server-server communication helps NetOps teams to analyze and spot potential threats early to avoid catastrophic effects.
LATEST FROM DR GLOBAL

United Arab Emirates Faces Intensified Cyber-Risk
The UAE leads the Middle East in digital-transformation efforts, but slow patching and legacy technology continue to thwart its security posture.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.