Follow Dark Reading:
 November 02, 2021
LATEST SECURITY NEWS & COMMENTARY
Free Tool Scans Web Servers for Vulnerability to HTTP Header-Smuggling Attacks
A researcher will release an open source tool at Black Hat Europe next week that roots out server weaknesses to a sneaky type of attack.
Understanding the Human Communications Attack Surface
Companies should recognize that collaboration platforms aren't isolated, secure channels where traditional threats don't exist.

(Sponsored Article) Finding the Right Approach to Cloud Security Posture Management (CSPM)

Cloud security is maturing — it has to. New strategies are surfacing to respond to new problems.


New 'Trojan Source' Method Lets Attackers Hide Vulns in Source Code
Researchers discover a new technique attackers could use to encode vulnerabilities into software while evading detection.
CrowdStrike to Buy Zero-Trust SaaS Provider
SecureCircle provides data-level zero-trust control to endpoints.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.

Wardrivers Can Still Easily Crack 70% of Wi-Fi Passwords
Weaknesses in the current Wi-Fi standard and poorly chosen passwords allowed one wardriver to recover 70% of wireless network passwords.

Are Baby Boomers More Vulnerable Online Than Younger Generations? You Might Be Surprised
Growing up with computers and the Internet doesn't necessarily convey all the advantages often attributed to younger users.

MORE
EDITORS' CHOICE

6 Ways to Rewrite the Impossible Job Description
It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.
LATEST FROM THE EDGE

Name That Edge Toon: Parting Thoughts
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
LATEST FROM DR TECHNOLOGY

How AI-Driven Security Analytics Speeds Up Enterprise Defense
Fresh off a $250 million Series E round, Devo Technology plans to expand the core security analytics platform with new features to help enterprise defenders work with security data faster and more effectively.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Automation Into Secure Application Development

    Creating secure code is crucial to enterprise application development. But many application developers resist taking extra security steps because they add extra work and time to the development process. In this Dark Reading webinar, application security experts discuss ways to ...

  • Zero-Trust in Real Life

    Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model - trust nothing, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.