Follow Dark Reading:
 August 10, 2018
LATEST SECURITY NEWS & COMMENTARY
IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships
Researcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network - and other findings - at Black Hat USA today.
AWS Employee Flub Exposes S3 Bucket Containing GoDaddy Server Configuration and Pricing Models
Publicly accessible S3 bucket included configuration data for tens of thousands of systems, as well as sensitive pricing information.
Xori Adds Speed, Breadth to Disassembler Lineup
A new open source tool, introduced at Black Hat USA, places a priority on speed and automation.
Weakness in WhatsApp Enables Large-Scale Social Engineering
Problem lies in WhatsApp's validation of message parameters and cannot be currently mitigated, Check Point researchers say.
Oh, No, Not Another Security Product
Let's face it: There are too many proprietary software options. Addressing the problem will require a radical shift in focus.
PGA of America Struck By Ransomware
Hackers provided a Bitcoin wallet number, though no specific ransom amount was demanded, for the return of files.
MORE NEWS & COMMENTARY
HOT TOPICS
Mastering MITRE's ATT&CK Matrix
This breakdown of Mitre's model for cyberattacks and defense can help organizations understand the stages of attack events and, ultimately, build better security.

Shadow IT: Every Company's 3 Hidden Security Risks
Companies can squash the proliferation of shadow IT if they listen to employees, create transparent guidelines, and encourage an open discussion about the balance between security and productivity.

4 Reasons Why Companies Are Failing at Incident Response
When it comes to containing the business impacts of a security breach, proper planning is often the difference between success and failure.

MORE
EDITORS' PICKS

10 Threats Lurking on the Dark Web
Despite some high-profile takedowns last year, the Dark Web remains alive and well. Here's a compilation of some of the more prolific threats that loom.
Cloud Intelligence Throwdown: Amazon vs. Google vs. Microsoft
A closer look at native threat intelligence capabilities built into major cloud platforms and discussion of their strengths and shortcomings.
Tech Resources
FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.