Follow Dark Reading:
 March 24, 2021
LATEST SECURITY NEWS & COMMENTARY
Inside the Web Shell Used in the Microsoft Exchange Server Attacks
The history and details of China Chopper - a Web shell commonly seen in the widespread Microsoft Exchange Server attacks.
Anti-Spoofing for Email Gains Adoption, but Enforcement Lags
More organizations adopt sender authentication, but strict quarantining or rejection of unauthenticated messages remains uncommon.
Organizations Making Little Headway in Addressing Human Risk
Most enterprise security awareness efforts remain half-hearted, a new SANS survey shows.
Disrupting the Cybercriminal Supply Chain
It is time to turn the tables on cybercriminals and use their own tactics against them.
Data Protection Is a Group Effort
When every employee is well-versed in customer data privacy principles, the DPO knows the enterprise's sensitive data is in good hands.
Disgruntled IT Contractor Sentenced in Retaliatory Office 365 Attack
Former contractor deleted 1,200 user accounts in revenge.
Do Cybercriminals Fear Arrest?
Researchers explore how cybercriminals weigh the possibility of arrest and whether it deters criminal activity.
MORE NEWS & COMMENTARY
HOT TOPICS
Researchers Discover Two Dozen Malicious Chrome Extensions
Extensions are being used to serve up unwanted adds, steal data, and divert users to malicious sites, Cato Networks says.

Acer Reportedly Hit With $50M Ransomware Attack
Reports say a ransomware gang has given Acer until March 28 to pay, or it will double the ransom amount.

Top 3 Cybersecurity Lessons Learned From the Pandemic
Defending an enterprise of fully remote employees and their devices at this scale and speed had never been done before. Now, we do it every day.

MORE
EDITORS' CHOICE

Microsoft Exchange Server Attacks: 9 Lessons for Defenders
Experts share their guidance for organizations running on-premise Exchange servers in the wake of rapidly spreading attacks.
On the Road to Good Cloud Security: Are We There Yet?
Misconfigured infrastructure is IT pros' top cloud security concern, but they're conflicted on how to address it in practice.
LATEST FROM THE EDGE

Cartoon Caption Winner: In Hot Water
And the winner of The Edge's March cartoon caption contest is ...
Tech Resources
ACCESS TECH LIBRARY NOW

  • Understanding XDR - April 8 FREE Webinar

    In this webinar, experts discuss the benefits and limitations of EDR, and offer recommendations on how to extend these capabilities to other parts of the IT infrastructure in order to improve overall security.

  • Detecting & Mitigating Attacks on Remote Workers

    In this webinar, experts discuss some of the cyber attacks that have been made on work-from-home end users, as well as exploits against remote systems and devices.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.