Follow Dark Reading:
 March 25, 2020
LATEST SECURITY NEWS & COMMENTARY
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Researchers warn Microsoft 365 account holders to pay attention to unknown applications that request permissions.
Cybercriminals' Promises to Pause During Pandemic Amount to Little
As pandemic worsens, online profiteering -- from fraudsters to ransomware operators to cybercriminal hacking -- continues unabated, despite some promises from the underground.
Automated Tools Make Cyberattacks Easier to Pull Off
Gone are the days when threat actors had to actually spend time and effort planning and developing an attack on their own, Recorded Future says.
How to Secure Your Kubernetes Deployments
As more companies shift their software to a microservices-based architecture and orchestrate their containerized applications in Kubernetes, distributed security controls become a must.
Vulnerability Management Isn't Just a Numbers Game
Attackers work 24/7, so you have to be vigilant around the clock. Time for some game theory.
Malware Found Hidden in Android Utility Apps, Children's Games
The 'Tekya' malware, as researchers call it, is designed to imitate the user's actions to click advertisements.
New APT Targets Middle Eastern Victims
The new malware, dubbed "Milum," can take control of industrial devices.
MORE NEWS & COMMENTARY
HOT TOPICS
200M Records of US Citizens Leaked in Unprotected Database
Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.

What Cybersecurity Pros Really Think About Artificial Intelligence
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.

How Security Leaders at Starbucks and Microsoft Prepare for Breaches
Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

MORE
EDITORS' CHOICE

8 Infosec Page-Turners for Days Spent Indoors
Stuck inside and looking for a new read? Check out these titles written by security practitioners and reporters across the industry.
From Zero to Hero: CISO Edition
It's time for organizations to realize that an empowered CISO can effectively manage enterprise risk and even grow the business along the way.
NEW FROM THE EDGE

Three Ways Your BEC Defense Is Failing & How to Do Better
Business email compromises cost the economy billions of dollars. Experts have advice on how to stop them from hitting you for millions at a pop.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.