Follow Dark Reading:
 April 29, 2021
LATEST SECURITY NEWS & COMMENTARY
In Appreciation: Dan Kaminsky
Beloved security industry leader and researcher passes away unexpectedly at the age of 42.
Supernova Malware Actors Masqueraded as Remote Workers to Access Breached Network
China-based Spiral group is believed to be behind year-long attack, which exploited a flaw in SolarWinds Orion technology to drop a Web shell.
FluBot Malware's Rapid Spread May Soon Hit US Phones
The FluBot Android malware has spread throughout several European countries through an SMS package delivery scam.
Expect an Increase in Attacks on AI Systems
Companies are quickly adopting machine learning but not focusing on how to verify systems and produce trustworthy results, new report shows.
Looking for Greater Security Culture? Ask an 8-Bit Plumber
After 40 years of navigating catastrophes, video game character Mario can help us with a more intelligent approach to DevOps and improving security culture.
Improving the Vulnerability Reporting Process With 5 Steps
Follow these tips for an effective and positive experience for both the maintainer and external vulnerability reporter.
Apple Patches Serious MacOS Security Flaw
The bug can put Mac users at "grave risk" as it allows attackers to bypass Apple's security mechanisms, a researcher reports.
Password Manager Suffers 'Supply Chain' Attack
A software update to Click Studios' Passwordstate password manager contained malware.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Security Strategies as Employees Return to the Office
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal.

Do Cyberattacks Affect Stock Prices? It Depends on the Breach
A security researcher explores how data breaches, ransomware attacks, and other types of cybercrime influence stock prices.

SOC 2 Attestation Tips for SaaS Companies
Attestation helps SaaS vendors demonstrate that digital security is a primary focus.

Shift Left: From Concept to Practice
By moving security into development, your team can find and fix vulnerabilities before they become expensive, difficult, and publicly embarrassing problems.

MORE
EDITORS' CHOICE

10 Free Security Tools at Black Hat Asia 2021
Researchers are set to demonstrate a plethora of tools for conducting pen tests, vulnerability assessments, data forensics, and a wide range of other use cases.
Attacks Targeting ADFS Token Signing Certificates Could Become Next Big Threat
New research shows how threat actors can steal and decrypt signing certificates so SAML tokens can be forged.
LATEST FROM THE EDGE

Cybersecurity and the Way to a Balanced Life
With work more demanding than ever, how can cybersecurity pros safeguard their organizations and their own mental well-being at the same time?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Web Security: Protecting Your Data from Internet Threats

    One of the most accessible methods of cracking your corporate data is through a simple Internet connection. In this webinar, experts offer a look at some of the most common ways that cyber attackers use to crack enterprise systems via ...

  • Making XDR Work in Your Enterprise - Dark Reading

    In this Dark Reading webinar, experts discuss the real-life implementation issues surrounding emerging detection and response technologies. You'll learn how these emerging technologies can be integrated with your existing cybersecurity tools, and how XDR technology might affect your cybersecurity operations ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.