Follow Dark Reading:
 December 27, 2016
LATEST SECURITY NEWS & COMMENTARY
Malware Used In DNC Breach Found Tracking Ukraine Military
Russian 'Fancy Bear' now tied to Ukraine artillery Android app hack with the same malware used in breach of the Democratic National Committee.
Inside The Vulnerability Disclosure Ecosystem
Report released by NTIA stakeholders offers new information on how organizations respond to security vulnerabilities - and what researchers think.
Major Cyberattacks On Healthcare Grew 63% In 2016
US hospitals lack new technologies and best practices to defend against threats, new report says.
More Than 50% Of Biggest Holiday Retailers May Not Be PCI-Compliant
Security Scorecard warns while the industry has made progress, many are still not covering the basics of security.
Network Security: An Ounce Of Prevention Is Worth A Pound Of Reaction
For humans ailments, prevention might begin with an allergist. In security, it's the network engineer.
MORE NEWS & COMMENTARY
HOT TOPICS
Panasonic Inflight Entertainment System Vulnerable To Attack
Flaws could theoretically allow access to aircraft control systems, IOActive says in disputed report.

Russian Hackers Run Record-Breaking Online Ad-Fraud Operation
'Methbot' is a sophisticated cybercrime scheme that has hit major US advertisers and publishing brands and pilfered millions of dollars per day.

MORE
EDITORS' CHOICE

5 Ways The Cyber-Threat Landscape Shifted In 2016
IoT botnets and turnkey phishing services were just some of the ways the bad guys stayed ahead in 2016.
Application Security Still Slows Developer Work
Cooperation among DevOps teams might be growing, but security testing still seen as a road block to continuous delivery.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Strengthen Your Security With Threat Analysis

    In the past, security response teams and security operations centers (SOCs) have focused most of their effort on reacting to new attacks and compromises. But as threat intelligence becomes more sophisticated and "threat hunting" becomes a more common tool in ...

  • Detecting and Mitigating Targeted and Sophisticated Attacks

    In the past, most cyber attacks simply exploited the most vulnerable systems. Today, however, there is an increasing number of sophisticated attacks that target specific companies, data, or even employees. These attacks are well-disguised and may escape conventional security defenses. ...

MORE WEBINARS

Partner Perspectives

Explained: Domain-Generating Algorithms
Cybercriminals use domain-generating algorithms to prevent their servers from being blacklisted or taken down.

Investments In Security Operations Centers Are Paying Off, Study Finds
SOCs help organizations reduce security incidents and improve operational maturity.

Phishing Can Leverage Users To Bypass Sandboxes
Using social engineering to bypass traditional security defenses is not new and will certainly continue to grow.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Rapid7 Named Common Vulnerability and Exposure Numbering Authority
SECDO Completes $10M Funding to Revolutionize Security Incident Response
Investment was led by the Rafael Development Corporation (RDC) and Check Point Co-founder & Chairman Marius Nacht
MORE PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.