Follow Dark Reading:
 March 13, 2018
LATEST SECURITY NEWS & COMMENTARY
Malware Leveraging PowerShell Grew 432% in 2017
Cryptocurrency mining and ransomware were other major threats.
Chinese APT Backdoor Found in CCleaner Supply Chain Attack
Avast discovers ShadowPad tool for use in apparent planned third stage of the targeted attack campaign.
FlawedAmmyy RAT Campaign Puts New Spin on Old Threat
A remote access Trojan, in use since 2016, has a new tactic: combining zip files with the SMB protocol to infect target systems.
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Proposed new connected-product repair laws will provide hackers with more tools to make our lives less secure.
Asia's Security Leaders Feel Underprepared for Future Threats: Report
A new study highlights major concerns of cybersecurity leaders in Asia, where most fear critical infrastructure attacks, advanced threats, and social engineering.
CyberArk Buys Vaultive for Privileged Account Security Technology
The account security firm will use Vaultive's tech to protect privileged users at heightened risk for cyberattacks.
Georgia Man Pleads Guilty to Business Email Compromise Attacks
Kerby Rigaud has pleaded guilty to using BEC attacks in attempts to steal more than $1 million from US businesses.
MORE NEWS & COMMENTARY
HOT TOPICS
Millions of Office 365 Accounts Hit with Password Stealers
Phishing emails disguised as tax-related alerts aim to trick users into handing attackers their usernames and passwords.

How Guccifer 2.0 Got 'Punk'd' by a Security Researcher
Security expert and former Illinois state senate candidate John Bambenek details his two months of online interaction with the 'unsupervised cutout' who shared with him more stolen DCCC documents.

Pragmatic Security: 20 Signs You Are 'Boiling the Ocean'
Ocean-boiling is responsible for most of the draconian, nonproductive security policies I've witnessed over the course of my career. Here's why they don't work.

MORE
EDITORS' CHOICE

7 University-Connected Cyber Ranges to Know Now
Universities are beginning to add cyber ranges to the facilities for teaching cyber security to students and professionals.
Disappearing Act: Dark Reading Caption Contest Winners
A standout field with hysterical puns about security policies, Meltdown, Amazon Web Services, and the right to be forgotten. And the winner is ...
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

A Sneak Peek at the New NIST Cybersecurity Framework
Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.

Journey to the Cloud: Overcoming Security Risks
Lessons learned from a global consultancy's 10-year transition from on-premises to 99% cloud-based infrastructure.

Virtual Private Networks: Why Their Days Are Numbered
As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.