Follow Dark Reading:
 January 19, 2022
LATEST SECURITY NEWS & COMMENTARY
Microsoft Details Recent Damaging Malware Attacks on Ukrainian Organizations
"WhisperGate" malware was used to overwrite Master Boot Record and other files to render systems inoperable at several organizations in Ukraine, Microsoft says.
Researchers Explore Hacking VirusTotal to Find Stolen Credentials
VirusTotal can be used to collect large amounts of credentials without infecting an organization or buying them online, researchers found.
US Search for Vulnerabilities Drives 10x Increase in Bug Reports
Cross-site scripting and broken access controls continued to be the top classes of vulnerabilities researchers discovered, according to Bugcrowd's annual vulnerability report.
5 Reasons Why M&A Is the Engine Driving Cybersecurity
Consistent acquisition of key technologies and talent is a proven strategy for growth.
Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Take 'Urgent' Steps to Secure Systems From Damaging Attacks, CISA Says
CISA issues alert for senior leadership of US organizations amid rising tensions between Russia and Ukraine.
Europol Shuts Down Popular Cybercriminal VPN Service
VPNLab was used to support criminal activity, including ransomware campaigns and other attacks, Europol officials report.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
New Vulnerabilities Highlight Risks of Trust in Public Cloud
Major cloud providers are vulnerable to exploitation because a single flaw can be turned into a global attack using trusted core services.

New Cyberattack Campaign Uses Public Cloud Infrastructure to Spread RATs
An attack campaign detected in October delivers variants of Nanocore, Netwire, and AsyncRATs to target user data.

How to Protect Your Phone from Pegasus and Other APTs
The good news is that you can take steps to avoid advanced persistent threats. The bad news is that it might cost you iMessage. And FaceTime.

MORE
EDITORS' CHOICE

Russia Takes Down REvil Ransomware Operation, Arrests Key Members
Timing of the move has evoked at least some skepticism from security experts about the country's true motives.
LATEST FROM THE EDGE

End Users Remain Organizations' Biggest Security Risk
Yet they're showing signs of improvement across several important areas, a Dark Reading survey reveals.
LATEST FROM DR TECHNOLOGY

Cloud Identity Startup Permiso Launches With $10M Seed
Permiso's co-founders say the No. 1 problem in the cloud is identity, and their platform is designed to tackle the notoriously difficult challenge of monitoring the activity of those identities.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 2021 DDoS Attack Trends: Year in Review

    2021 was an exceptionally busy year for attackers. From some of the largest volumetric DDoS attacks launched by historically large swarms of botnets, to massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world, DDoS ...

  • Monitoring and Securing Remote and Work-From-Home Environments

    In the wake of COVID-19, many IT departments find themselves managing more remote and work-from-home systems than ever before. What does this mean for cybersecurity? In this webinar, top experts discuss methods for rethinking remote access and end user systems ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.