Follow Dark Reading:
 October 21, 2021
LATEST SECURITY NEWS & COMMENTARY
JavaScript Packing Found in More Than 25% of Malicious Sites
Obfuscation techniques are extremely prevalent, data shows, but they can't be used as a single indicator of compromise because legitimate websites use them.
Microsoft-Signed Rootkit Targets Gaming Environments in China
FiveSys is the second publicly known rootkit since June that attackers have managed to sneak past Microsoft's driver certification process.
Deepfake Audio Scores $35M in Corporate Heist
A combination of business email compromise and deepfake audio led a branch manager to transfer millions to scammers, in a case that serves as a warning to organizations.
The Ransomware Payment Dilemma: Should Victims Pay or Not?
It's time to steer the conversation away from whether payment bans should be implemented to how and when they should take effect.
Passwordless Is the Future … but What About the Present?
Password managers, single sign-on, and multifactor authentication each offers its own methodology and unique set of benefits — and drawbacks — to users.
Execs From Now-Defunct GigaTrust Arrested in $50M Fraud Scheme
Email endpoint security-as-a-service company founder and two others indicted in an elaborate financial fraud scheme.
Google: Phishing Campaign Targets YouTube Creators
The attackers behind the campaign, which distributes cookie theft malware, are attributed to actors recruited in a Russian-speaking forum.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
10 Hot Red Team Tools Set to Hit Black Hat Europe
The slate of Arsenal presentations at Black Hat Europe is set to feature lots of low-cost and free goodies for offensive security pros.

(ISC)² Plans Entry-Level Certification for Aspiring Security Pros
The certification aims to help new entrants to the security field with professional development and career paths early on.

From Help Desk to Head of SOC: Building a Cybersecurity Career on Empathy and Candor
Why a passion for helping people is key to delivering effective cybersecurity solutions.

MORE
EDITORS' CHOICE

Damages Escalate Rapidly in Multiparty Data Breaches
Analysis of the top-50 multiparty attacks over the past decade finds that nation-state-linked hackers focused on disruption and using stolen credentials cause the most damage.
LATEST FROM THE EDGE

Removing Friction for the Enterprise With Trusted Access
Our work lives are supposed to be simpler and easier because of technology. At least that’s the promise.
LATEST FROM DR TECHNOLOGY

Proposed HTTPA Protocol Uses TEEs to Secure the Web
Intel researchers describe how Trusted Execution Environments can enhance HTTPS and boost web security.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Automation Into Secure Application Development

    Creating secure code is crucial to enterprise application development. But many application developers resist taking extra security steps because they add extra work and time to the development process. In this Dark Reading webinar, application security experts discuss ways to ...

  • Zero-Trust in Real Life

    Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model - trust nothing, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.