Follow Dark Reading:
 August 09, 2021
LATEST SECURITY NEWS & COMMENTARY
FragAttacks Foil 2 Decades of Wireless Security
Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.
Researchers Call for 'CVE' Approach for Cloud Vulnerabilities
New research suggests isolation among cloud customer accounts may not be a given — and the researchers behind the findings issue a call to action for cloud security.
In Attack Surface Management, It's What You Don't See That Can Sink You
To fully protect your organization, you need to go deep and discover the risky IT assets, networks, and environments you don't yet know about.
Researchers Find Flaw in IoT Devices' Random Number Generator
Every Internet-connected device with a random number generator contains a vulnerability that fails to properly generate random numbers, researchers report.
FTC: Phishing Campaign Targets Unemployment Benefits & PII
A malicious link brings victims to a fake state workforce agency that requests credentials and personal information.
MORE NEWS & COMMENTARY
HOT TOPICS
CISA Launches JCDC, the Joint Cyber Defense Collaborative
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA on Thursday.

5 Questions Your Organization Must Ask to Prepare for a Ransomware Attack
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomware wave.

5 Things Incident Responders Wish CISOs Would Prioritize
What's on the incident responder's wish list? If CISOs prioritized these five issues, it would help make security response a whole lot more effective.

MORE
EDITORS' CHOICE

Incident Responders Explore Microsoft 365 Attacks in the Wild
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
4 Common Challenges of 'Shift Left' Security
Involving security in the earliest stages of software development helps prevent defects, but it's not without problems.
LATEST FROM THE EDGE

What Are Some of the Must-Have Steps in a Ransomware Response Plan?
What should organizations be sure to include in a ransomware response plan, and which steps are commonly missed?
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.