The group's attack methods have included exploits for a zero-day vulnerability in a livestock-tracking apps as well as for the Apache Log4 flaw.
Follow Dark Reading:
 March 10, 2022
LATEST SECURITY NEWS & COMMENTARY
Log4j and Livestock Apps: APT41 Wages Persistent Cyberattack Campaign on US Government
The group's attack methods have included exploits for a zero-day vulnerability in a livestock-tracking apps as well as for the Apache Log4 flaw.
FBI Alert: Ransomware Attacks Hit Critical Infrastructure Organizations
Bureau releases indicators of compromise for the RagnarLocker ransomware that has hit 10 different critical infrastructure sectors.
Zero Trust Can't Stop at the Federal Level
The federal government must step in to help local and state governments implement zero trust.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
8 More Women in Security You May Not Know but Should
Dark Reading highlights women who are quietly changing the game in cybersecurity. We also revisit some of those we've spoken to in the past to see what they're up to now.

Medical and IoT Devices From More Than 100 Vendors Vulnerable to Attack
PTC has issued patches for seven vulnerabilities — three critical — in its widely used Axeda remote management technology.

Beyond the Hype: AI's Future in Defensive Cybersecurity
Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.

MORE
EDITORS' CHOICE

Google to Buy Mandiant, Aims to Automate Security Response
In a deal worth $5.4 billion, Google would expand its security portfolio with managed detection and response (MDR) and threat intelligence, with an increasing focus on automation.
LATEST FROM THE EDGE

10 Signs of a Poor Security Leader
Weak leadership can demotivate and demoralize the security workforce. Here's what to look out for.
LATEST FROM DR TECHNOLOGY

What Security Controls Do I Need for My Kubernetes Cluster?
This Tech Tip offers some security controls to embed in your organization's CI/CD pipeline to protect Kubernetes clusters and corporate networks.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Deception a Part of Your Enterprise Defense Strategy

    Most enterprise defenses focus on preventing attackers from getting in. But what if you could distract and trick attackers by making them think they are advancing their attack-and then mislead them? In this webinar, experts discuss emerging tools and strategies ...

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.