Follow Dark Reading:
 February 28, 2018
LATEST SECURITY NEWS & COMMENTARY
Memcached Servers Being Exploited in Huge DDoS Attacks
Multiple vendors this week say they have seen a recent spike in UDP attacks coming in via port 11211.
SAML Flaw Lets Hackers Assume Users' Identities
Vulnerability affects single sign-on for SAML-reliant services including OneLogin, Duo Security, Clever, and OmniAuth.
Nation-State Hackers Adopt Russian 'Maskirovka' Strategy
New CrowdStrike report shows blurring of state-sponsored and cybercrime hacking methods.
Incident 'Management': What IT Security Can Learn from Public Safety
How a framework developed for fighting California wildfires back in the '70s can fortify first responders to a modern cyberattack.
NSA's Rogers: No White House Request for Action Against Russian Hacking
US Cyber Command head Michael Rogers told US Senate Armed Services Committee that actions to deter Russian hackers from interfering with upcoming US elections requires an order from the White House.
Security Starts with the User Experience
Preventing a data breach is safer and more cost-effective than dealing with a breach after it has already happened. That means a focus on security in the design phase.
Splunk to Acquire Phantom
$350 million deal scheduled to close Q1 2018.
MORE NEWS & COMMENTARY
HOT TOPICS
'OMG': New Mirai Variant Converts IoT Devices into Proxy Servers
The new malware also can turn bots into DDoS attack machines, says Fortinet.

93% of Cloud Applications Aren't Enterprise-Ready
The average business uses 1,181 cloud services, and most don't meet all recommended security requirements, Netskope says.

6 Cybersecurity Trends to Watch
Expect more as the year goes on: more breaches, more IoT attacks, more fines...

MORE
EDITORS' CHOICE

7 Key Stats that Size Up the Cybercrime Deluge
Updated data on zero-days, IoT threats, cryptomining, and economic costs should keep eyebrows raised in 2018.
SAVE THE DATE

March Dark Reading Event Calendar Spans BlackOps to SecDevOps
These upcoming webinars will help you comprehend the mysterious machinations inside the minds of hackers and in-house developers.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Misleading Cyber Foes with Deception Technology
Today's deception products go far beyond the traditional honeypot by catching attackers while they are chasing down non-existent targets inside your networks.

Enabling Better Risk Mitigation with Threat Intelligence
In order to get the maximum benefit from threat intel you need to be able to operationalize it. Here's how.

Security Liability in an 'Assume Breach' World
Cybersecurity today is more than an IT issue. It's a product quality issue, a customer service issue, an operational issue, and an executive issue. Here's why.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.