Follow Dark Reading:
 August 23, 2018
LATEST SECURITY NEWS & COMMENTARY
Microsoft Sinkholes 6 Fancy Bear/APT28 Internet Domains
Operation appears to have disrupted early stages of an attack campaign using spoofed nonprofit, Senate, and Microsoft domains.
The Votes Are In: Election Security Matters
Three ways to make sure that Election Day tallies are true.
It Takes an Average 38 Days to Patch a Vulnerability
Analysis of 316 million-plus security incidents uncovers most common types of real-world attacks taking place within in-production Web apps in the AWS and Azure cloud ecosystems.
Exploring, Exploiting Active Directory Admin Flaws
Common methods AD administrators use to protect their environments can easily be exploited. Here's how.
How to Gauge the Effectiveness of Security Awareness Programs
If you spend $10,000 on an awareness program and expect it to completely stop tens of millions of dollars in losses, you are a fool. If $10,000 prevents $100,000 in loss, that's a 10-fold ROI.
How Threats Increase in Internet Time
Cybercrime incidents and costs increase with each passing minute on the Internet.
MORE NEWS & COMMENTARY
HOT TOPICS
Hackers Use Public Cloud Features to Breach, Persist In Business Networks
Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks.

Hacker Unlocks 'God Mode' and Shares the 'Key'
A researcher proves that it's possible to break the most fundamental security on some CPUs.

Researchers Find New Fast-Acting Side-Channel Vulnerability
A group of researchers from Georgia Tech have discovered a method for pulling encryption keys from mobile devices without ever touching the phones, themselves.

MORE
EDITORS' CHOICE

7 Serious IoT Vulnerabilities
A growing number of employees have various IoT devices in their homes - where they're also connecting to an enterprise network to do their work. And that means significant threats loom.
Make a Wish: Dark Reading Caption Contest Winners
Certification, endpoint security, 2FA, phishing, and PII were among the themes and puns offered by readers in our latest cartoon caption competition. And the winners are ...

Cartoon: Hack the Vote

Start your day with a smile..


Tech Resources
ACCESS TECH LIBRARY NOW

  • Email & the Web - Go Great Together for Attackers, But What About for the Defenders?

    With nearly all security incidents and breaches originating from both email and the web -- and the necessity of these tools for your organizations day to day operations -- how can you protect your organization from the cyberattackers and their ...

  • End Phishing

    Are you suffering from agent overload, alert fatigue or the skills shortage? Do you need a better solution to document based phishing? If so, then this informative, interactive webinar is for you.

MORE WEBINARS
FEATURED REPORTS
  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.