Follow Dark Reading:
 November 16, 2021
LATEST SECURITY NEWS & COMMENTARY
How to Negotiate With Ransomware Attackers
Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.
The Troubling Rise of Internet Access Brokers
Criminal groups are ramping up use of IABs to get access to networks without having to deal with the initial reconnaissance and intrusion phases.
MacOS Zero-Day Used in Watering-Hole Attacks
Attackers targeted Chinese pro-democracy groups using a vulnerability fixed in September along with a second vulnerability fixed early in the year, Google says.
How Visibility Became the Lifeblood of SecOps and Business Success
The best way to succeed in long-term cybersecurity is to invest in visibility because you can't protect or defend against what you can't see.

(Sponsored Article) Insider IP Theft Is Surging — and Most Can't Stop It

The Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.


Name That Toon: Cubicle for Four
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
FBI Attributes Abuse of Its Email Account to Software 'Misconfiguration'
A wave of phony emails from an FBI mail server originated from an issue with the agency's Law Enforcement Enterprise Portal.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Open Source Project Aims to Detect Living-Off-the-Land Attacks
The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts.

How to Minimize Ransomware's Trail of Destruction and Its Associated Costs
One of the biggest mistakes an organization can make is blindly throwing technology at the problem instead of properly investing in building a security team.

Cloud Attack Analysis Unearths Lessons for Security Pros
Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.

MORE
EDITORS' CHOICE

How to Hire — and Retain — Effective Threat Hunters
Key characteristics that should be evaluated include curiosity, disposition, and fit with the culture.
LATEST FROM THE EDGE

7 Smart Ways a Security Team Can Win Stakeholder Trust

By demonstrating the following behaviors, security teams can more effectively move their initiatives forward.


LATEST FROM DR TECHNOLOGY

3 Must-Know Technologies to Protect Your Hybrid Workforce
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Protecting Enterprise Data from Malicious Insiders

    It's a sad truth: not all employees are nice. Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain. How do you know when a once-trustworthy employee is about to do ...

  • Creating an Encryption Strategy for Your Enterprise

    Maybe it's not time yet to start "quantum-proofing" (and maybe it is), but that doesn't mean your encryption strategy doesn't need a refresh. If your organization is like most enterprises, you've likely purchased or adopted a wide variety of encryption ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.