Follow Dark Reading:
 October 11, 2018
LATEST SECURITY NEWS & COMMENTARY
Meet 5 Women Shaping Microsoft's Security Strategy
Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity.
Microsoft Fixes Privilege Escalation 0Day Under Active Attack
This month's Patch Tuesday includes 49 patches, two of which are ranked Critical, and two security advisories.
IIS Attacks Skyrocket, Hit 1.7M in Q2
Drupal and Oracle WebLogic also were hit with more cyberattacks during same quarter.
Imperva to Be Acquired by Thoma Bravo for $2.1 Billion
But two law firms are investigating whether the security vendor breached its fiduciary duty to shareholders by not actively seeking buyers offering a higher price.
Google+ Vulnerability Hits Service, Leads to Shutdown
In response to the breach, Google is changing policies, modifying APIs, and shutting down Google+.
Russian Hacking Groups Intersect in Recent Cyberattacks
Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.
New Threat Group Conducts Malwareless Cyber Espionage
Gallmaker group is relying exclusively on legitimate tools and living-off-the-land tactics to make detection very difficult.
Security Researchers Struggle with Bot Management Programs
Bots are a known problem, but researchers will tell you that bot defenses create problems of their own when it comes to valuable data.
MORE NEWS & COMMENTARY
HOT TOPICS
Lessons Learned from the Facebook Breach: Why Logic Errors Are So Hard to Catch
By ensuring that each layer of protection scours an application for unintended uses, you can find the flaws before the bad guys do.

7 Most Prevalent Phishing Subject Lines
The most popular subject lines crafted to trick targets into opening malicious messages, gleaned from thousands of phishing emails.

MORE
EDITORS' CHOICE

GDPR Report Card: Some Early Gains but More Work Ahead
US companies paid the most, to date, to meet the EU's General Data Protection Regulation, according to a recent study, but UK companies made greater progress in achieving compliance goals.
7 Steps to Start Your Risk Assessment
Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.
New Domains: A Wide-Open Playing Field for Cybercrime
As bad actors increasingly exploit new domains for financial gain and other nefarious purposes, security teams need to employ policies and practices to neutralize the threat in real time. Here's why and how.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.