Follow Dark Reading:
 April 09, 2020
LATEST SECURITY NEWS & COMMENTARY
Keeping Vigilant for BEC Amid COVID-19 Chaos
FBI and security experts warn that attackers are particularly targeting cloud-based email systems at the moment.
After Adopting COVID-19 Lures, Sophisticated Groups Target Remote Workers
While coronavirus-themed emails and files have been used as a lure for weeks, attackers now are searching for ways to actively target VPNs and remote workers to take advantage of weaker security.
Researchers Fool Biometric Scanners with 3D-Printed Fingerprints
Tests on the fingerprint scanners of Apple, Microsoft, and Samsung devices reveal it's possible to bypass authentication with a cheap 3D printer.
'Unkillable' Android Malware App Continues to Infect Devices Worldwide
The xHelper Trojan has compromised over 55,000 devices so far, Kaspersky says.
BEC, Domain Jacking Help Criminals Disrupt Cash Transfers
The two hacking methods occur independently but are being used in concert to steal funds that are part of online payments and transactions.
Microsoft Releases COVID-19 Security Guidance
Information includes tips on how to keep IT systems infection-free.
Accenture Buys Revolutionary Security in Third Acquisition of 2020
The deal is intended to strengthen Accenture's critical infrastructure protection capabilities and address more complex IT and OT challenges.
MORE NEWS & COMMENTARY
HOT TOPICS
Chinese APT Groups Targeted Enterprise Linux Systems in Decade-Long Data Theft Campaign
Organizations across multiple industries compromised in a systematic effort to steal IP and other sensitive business data, BlackBerry says.

Microsoft: Emotet Attack Shut Down an Entire Business Network
The infection started with a phishing email and spread throughout the organization, overheating all machines and flooding its Internet connection.

Phishers Try 'Text Direction Deception' Technique to Bypass Email Filters
With COVID-19 concerns running high, attackers are trying new tactics to get to users.

MORE
EDITORS' CHOICE

9 Security Podcasts Worth Tuning In To
Recommendations for podcasts discussing news, trends, guidance, and stories across the cybersecurity industry.
Why Threat Hunting with XDR Matters
Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.
NEW FROM THE EDGE

How Do I Make Sure My Work-From-Home Users Install Updates?
Most enterprise endpoint solutions will support policies to enforce recommended updates.
Feline Secure?
When there's a will, there's a way.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security 101

    Don't miss this InformationWeek and IT Pro virtual event focused on Cloud Security. Keynote topics: * Insider Threat Insights: Securing the Cloud Against Internal Danger *Cloud Security 101: Simple Strategies for Safeguarding Your Business.

  • Zero-Trust In Practice

    In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you'll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.