Follow Dark Reading:
 March 08, 2018
LATEST SECURITY NEWS & COMMENTARY
How Guccifer 2.0 Got 'Punk'd' by a Security Researcher
Security expert and former Illinois state senate candidate John Bambenek details his two months of online interaction with the 'unsupervised cutout' who shared with him more stolen DCCC documents.
Intel SGX Can Be Used to Hide, Execute Malware
The microprocessor giant's Software Guard Extensions security feature can be abused to implement virtually undetectable malware, Graz University researchers say.
Researchers Defeat Android OEMs' Security Mitigations
At Black Hat Asia, two security experts will bypass security improvements added to Android by equipment manufacturers.
Group-IB Helps Suspend Ukrainian DDoS Attack Group
This case marks the first successful prosecution of cybercriminals in Ukraine, the organization reports.
Privilege Abuse Attacks: 4 Common Scenarios
It doesn't matter if the threat comes from a disgruntled ex-employee or an insider anticipating financial gain, privilege abuse patterns are pretty much the same, and they're easy to avoid.
Why Security-Driven Companies Are More Successful
Software Security Masters are better at handling application development security and show much higher growth than their peers. Here's how to become one.
Memcached DDoS Attack: Kill Switch, New Details Disclosed
Corero shares a kill switch for the Memcached vulnerability and reports the flaw is more extensive than originally believed.
MORE NEWS & COMMENTARY
HOT TOPICS
Millions of Office 365 Accounts Hit with Password Stealers
Phishing emails disguised as tax-related alerts aim to trick users into handing attackers their usernames and passwords.

How & Why the Cybersecurity Landscape Is Changing
A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.

Insider Threat Seriously Undermining Healthcare Cybersecurity
Two separate reports suggest insiders - of the malicious and careless variety - pose more of a problem in healthcare than any other sector.

MORE
EDITORS' CHOICE

6 Questions to Ask Your Cloud Provider Right Now
Experts share the security-focused issues all businesses should explore when researching and using cloud services.
Pragmatic Security: 20 Signs You Are 'Boiling the Ocean'
Ocean-boiling is responsible for most of the draconian, nonproductive security policies I've witnessed over the course of my career. Here's why they don't work.
Tech Resources

Partner Perspectives

A Sneak Peek at the New NIST Cybersecurity Framework
Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.

Journey to the Cloud: Overcoming Security Risks
Lessons learned from a global consultancy's 10-year transition from on-premises to 99% cloud-based infrastructure.

Virtual Private Networks: Why Their Days Are Numbered
As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.