Follow Dark Reading:
 February 16, 2018
LATEST SECURITY NEWS & COMMENTARY
IRS Reports Steep Decline in Tax-Related ID Theft
Research group Javelin confirms that the numbers are trending in the right direction, with total fraud losses dropping more than 14% to $783 million.
White House: Russian Military Behind NotPetya Attacks
Trump administration statement comes on the heels of UK government calling out Russia for the cyberattacks that spread through Europe and elsewhere.
North Korea-Linked Cyberattacks Spread Out of Control: Report
New details on old cyberattacks originating from North Korea indicate several forms of malware unintentionally spread wider than authors intended.
Cybercrime Gang Ramps up Ransomware Campaign
In the last few weeks, Gold Lowell group has collected over $350K after infecting victims with SamSam crypto malware, researchers at Secureworks found.
From DevOps to DevSecOps: Structuring Communication for Better Security
A solid approach to change management can help prevent problems downstream.
Democracy & DevOps: What Is the Proper Role for Security?
Security experts need a front-row seat in the application development process but not at the expense of the business.
Air Force Awards $12,500 for One Bug
The highest single bounty of any federal bug bounty program yet is awarded through Hack the Air Force 2.0.
Oracle Buys Zenedge for Cloud Security
Oracle announces its acquisition of Zenedge, which focuses on cloud-based network and infrastructure security.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Nation-State Hacking Groups to Watch in 2018
The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.

Fileless Malware: Not Just a Threat, but a Super-Threat
Exploits are getting more sophisticated by the day, and cybersecurity technology just isn't keeping up.

One in Three SOC Analysts Now Job-Hunting
The more experienced a SOC analyst gets, the more his or her job satisfaction declines, a new survey of security operations center staffers shows.

MORE
EDITORS' CHOICE

Encrypted Attacks Continue to Dog Perimeter Defenses
Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.

Navigating the Threat Intelligence Maze

In this strategic security report IT security professionals offer insight on how they are collecting, analyzing, and using threat intelligence to root out sophisticated threats and improve their overall defenses.


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

The Mirai Botnet Is Attacking Again...
And the spinoff bots - and all their command and control hostnames buried in the morass of digital data - are hilarious.

The GDPR Clock Is Running Out. Now What?
Many organizations impacted by new European Union data privacy rules that go into effect May 25 are still blind to some of the basics.

BrickerBot: Internet Vigilantism Ends Don't Justify the Means
However noble the intention, obtaining unauthorized access to devices and making them unusable is illegal and undermines the work of ethical researchers.

FEATURED REPORTS
  • [Strategic Security Report] Cloud Security's Changing Landscape

    The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.