Follow Dark Reading:
 June 21, 2018
LATEST SECURITY NEWS & COMMENTARY
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Hackers are using the infrastructure, meant to transmit data between applications, for command and control.
China-Based Cyber Espionage Campaign Targets Satellite, Telecom, Defense Firms
Threat group Thrip is using three computers based in China to steal data from targeted companies in Southeast Asia and the US, Symantec says.
Intel VP Talks Data Security Focus Amid Rise of Blockchain, AI
Intel vice president Rick Echevarria discusses the challenges of balancing data security with new technologies like blockchain and artificial intelligence.
Inside a SamSam Ransomware Attack
Here's how hackers use network tools and stolen identities to turn a device-level compromise into an enterprise-level takedown.
Mylobot Malware Brings New Sophistication to Botnets
The malware pulls together a variety of techniques to gain a foothold and remain undiscovered.
5 Tips for Integrating Security Best Practices into Your Cloud Strategy
Do 'cloud-first' strategies create a security-second mindset?
MORE NEWS & COMMENTARY
HOT TOPICS
How to Prepare for 'WannaCry 2.0'
It seems inevitable that a more-powerful follow-up to last year's malware attack will hit sooner or later. You'd better get prepared.

Tesla Employee Steals, Sabotages Company Data
The electric carmaker is the victim of an "extensive and damaging" insider attack, says CEO Elon Musk.

Trump-Kim Meeting Was a Magnet For Russian Cyberattacks
Attacks directed at targets in Singapore went through the roof earlier this week.

MORE
EDITORS' CHOICE

Why Cybercriminals Attack

A day-long look, Wednesday, June 27, at who your attackers are, how they behave, and what you can do about them. Keynote from Ed Amoroso, CEO Tag Cyber, starts at 11 am ET.


The Best and Worst Tasks for Security Automation
As with all new tech, there are good times and and bad times to use it. Security experts share which tasks to prioritize for automation.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.