Follow Dark Reading:
 January 07, 2021
LATEST SECURITY NEWS & COMMENTARY
Microsoft Source Code Exposed: What We Know & What It Means
Microsoft says there is no increase in security risk; however, experts say access to source code could make some steps easier for attackers.
6 Open Source Tools for Your Security Team
Open source tools can be great additions to your cloud security arsenal. Here are a half-dozen to get you started.
China's APT Groups May Be Looking to Cash In
Two campaigns have resulted in encrypted drives and ransom notes, suggesting that some China-linked nation-state advanced persistent threat groups have added financial gain as a motive, researchers say.
The Coolest Hacks of 2020
Despite a pandemic and possibly the worst cyberattack campaign ever waged against the US, the year still had some bright spots when it came to "good" and creative hacks.
SolarWinds Hit With Class-Action Lawsuit Following Orion Breach
SolarWinds shareholders accuse the company of lying about its security practices ahead of the disclosure of a massive security incident.
T-Mobile Hacked -- Again
The wireless carrier has suffered a data breach for the fourth time since 2018.
Nissan Source Code Leaked via Misconfigured Git Server
Leaked information includes source code of Nissan mobile apps, diagnostics tool, and market research tools and data, among other assets.
What You Need to Know About California's New Privacy Rules
Proposition 24 will change Californians' rights and business's responsibilities regarding consumer data protection.
COVID-19's Acceleration of Cloud Migration & Identity-Centric Security
Here are some tips for updating access control methods that accommodate new remote working norms without sacrificing security.
MORE NEWS & COMMENTARY
HOT TOPICS
FBI, CISA, NSA & ODNI Cite Russia in Joint Statement on 'Serious' SolarWinds Attacks
The attacks appear to be an "intelligence-gathering" mission, the agencies said.

10 Benefits of Running Cybersecurity Exercises
There may be no better way to ascertain your organization's strengths and weaknesses than by running regular security drills.

Homomorphic Encryption: The 'Golden Age' of Cryptography
The ability to perform complex calculations on encrypted data promises a new level of privacy and data security for companies in the public and private sectors. So when can they get started?

MORE
EDITORS' CHOICE

CISO New Year's Resolutions for 2021
Six resolutions for forward-looking cyber-risk leaders.
How to Protect Your Organization's Digital Footprint
As the digital risk landscape evolves and grows, organizations must stay vigilant against online threats.
LATEST FROM THE EDGE

Security Pros Reflect on 2020
Eight cybersecurity leaders go deep on their most valuable (and very human) takeaways from a year like no other we've known.
Tech Resources
ACCESS TECH LIBRARY NOW

  • ROI and Beyond for the Cloud

    Moving to the cloud isn't just about pulling expensive equipment out of a data center. Going with a cloud provider involves its own set of costs. However, a cloud strategy offers other business benefits, some that can be calculated on ...

  • Defense and Response Against Insider Threats & User Errors

    In this webinar, industry experts will discuss the key strategies, processes, and technologies that enterprises need to mitigate the most damaging data breaches of all -- the ones created by trusted users.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.