Follow Dark Reading:
 November 03, 2021
LATEST SECURITY NEWS & COMMENTARY
Microsoft Expands Security to AWS in Multicloud Push
Microsoft will expand its cloud security tools to AWS within a suite called Defender for Cloud and launch a new Defender for Business in preview later this month.
Phishing and Spam Lures Feature Sports, Aim to Steal Credentials
Spam volume declined slightly in the third quarter, but attackers sent almost 36 million malicious email attachments, up 5% from the previous quarter, one security firm says.
Attackers Flaunt Remote Access Credentials, Threaten Supply Chain
Attackers advertise access to computers within shipping and logistics companies as the global supply chain struggles to meet post-COVID demands.
How Hackers Are Targeting Cryptocurrency
Crypto exchanges that want to maintain credibility must implement some of the same "know your customer" controls used by banks and similar institutions.
SaaS and Third-Party Risk: Is Your Organization Asking the Hard Questions?
An investment in due diligence might prevent your organization from being part of next week's breach news cycle.
FBI: Ransomware Actors Use Financial Events to Extort Victims
Attackers research financial information about an organization and threaten to disclose it if they don't receive ransom quickly.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Cybersecurity Talent Gap Narrows as Workforce Grows
Job satisfaction and salaries have both increased for cybersecurity professionals, as younger workers seek specific training to prepare for a cybersecurity career.

SEO Poisoning Used to Distribute Ransomware
This tactic — used to distribute REvil ransomware and the SolarMarker backdoor — is part of a broader increase in such attacks in recent months, researchers say.

Understanding the Human Communications Attack Surface
Companies should recognize that collaboration platforms aren't isolated, secure channels where traditional threats don't exist.

MORE
EDITORS' CHOICE

Free Tool Scans Web Servers for Vulnerability to HTTP Header-Smuggling Attacks
A researcher will release an open source tool at Black Hat Europe next week that roots out server weaknesses to a sneaky type of attack.
LATEST FROM THE EDGE

Simulation Game Teaches Non-Security Staff How to Handle a Cyber Crisis
In this card-based game from Kaspersky, players work through a cyberattack scenario and learn how each decision they make has consequences.
LATEST FROM DR TECHNOLOGY

Cloud, Remote Work Will Change How IT Uses Vulnerability Scanners
Tenable added Raspberry Pi support to Nessus v10.0 to help security professionals conduct audits and assessments remotely.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Creating an Encryption Strategy for Your Enterprise

    Maybe it's not time yet to start "quantum-proofing" (and maybe it is), but that doesn't mean your encryption strategy doesn't need a refresh. If your organization is like most enterprises, you've likely purchased or adopted a wide variety of encryption ...

  • Building Automation Into Secure Application Development

    Creating secure code is crucial to enterprise application development. But many application developers resist taking extra security steps because they add extra work and time to the development process. In this Dark Reading webinar, application security experts discuss ways to ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.