Follow Dark Reading:
 December 22, 2017
LATEST SECURITY NEWS & COMMENTARY
Fileless Malware Attacks Hit Milestone in 2017
Non-malware attacks account for the majority of all attacks this year, and ransomware grows to a $5 billion industry, new data shows.
Russia's Fancy Bear APT Group Gets More Dangerous
Encryption and code refreshes to group's main attack tool have made it stealthier and harder to stop, ESET says.
Why Network Visibility Is Critical to Removing Security Blind Spots
You can't secure what you can't see. Here are four ways to shine a light on the dark spaces of your corporate infrastructure.
Small,Targeted Ransomware Attacks Emerge
Cybercriminals narrow their focus on specific industries, geographies, or size for a better return on investment, security experts say.
Businesses Go on Pre-Holiday Cloud Acquisition Spree
VMware, McAfee, and Trend Micro announce a series of acquisitions that indicate a strong focus on cloud security.
Facebook Helps Users Detect Phishing Emails
A new Facebook tool shares recent security-related emails so users can verify whether messages are legitimate.
US Census Bureau: Data Exposed in Alteryx Leak Already Public
The US Census Bureau says no personally identifiable information it collected was compromised in this week's Alteryx leak.
MORE NEWS & COMMENTARY
HOT TOPICS
Top 8 Cybersecurity Skills IT Pros Need in 2018
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.

Advanced Deception: How It Works & Why Attackers Hate It
While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats.

Another Cyberattack Spotted Targeting Mideast Critical Infrastructure Organizations
Operation Copperfield appears focused on data theft and reconnaissance, Nyotron says.

MORE
EDITORS' CHOICE

9 Banking Trojans & Trends Costing Businesses in 2017
New Trojans appeared, old ones resurfaced, and delivery methods evolved as cybercriminals set their sights on financial data.
Digital Forensics & the Illusion of Privacy
Forensic examiners don't work for bounties. They do what is required to catch criminals, pedophiles, or corporate embezzlers, and now their important security research is finally being acknowledged.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 5 Things to Prepare For in 3rd Party Cyber Risk Management in 2018

    Join Michael Rasmussen, Founder of GRC20/20, and Gary Phipps, Senior Director of Solution Engineering at CyberGRX, so you can kick off 2018 with a strategic approach to third-party cyber risk management.

  • Ransomware: Trends, Use Cases & Protection

    Ransomware is one of the favorite flavors of malware and is particularly vicious and showing no signs of slowing down. Join this webinar as Senior Security Researcher Kyle Wilhoit helps us to understand ransomware trends, ransomware use cases, the financial ...

MORE WEBINARS

Partner Perspectives

Be a More Effective CISO by Aligning Security to the Business
These five steps will you help marshal the internal resources you need to reduce risk, break down barriers, and thwart cyber attacks.

Is a Good Offense the Best Defense Against Hackers?
A proposed new law could make it legal for companies to hack back against attacker. But will it work?

Why Third-Party Security Is your Security
Managing third-party risk isn't just a good idea, in many cases, it's the law. This security framework can help you minimize the threat.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.