Follow Dark Reading:
 September 16, 2021
LATEST SECURITY NEWS & COMMENTARY
Microsoft Warns of Vuln That Allowed Access to Azure Infrastructure
Microsoft ran a five-year-old component that allowed vulnerability researchers to punch through the isolation that normally protects cloud tenants, researchers found.
Nearly 50% of On-Premises Databases Have Vulnerabilities
A network compromise shouldn't mean "game over" for corporate data, but survey data shows many companies fail to protect their crown jewels.
REvil Ransomware Group's Sudden Re-emergence Sparks Concerns
Some had hoped the notorious Russia-based group had been pressured to quit for good after a couple of especially egregious attacks on US targets earlier this year.
Microsoft Patches MSHTML Vuln Among 66 CVEs
This month's Patch Tuesday release addresses a remote code execution bug under active attack and a publicly known flaw in Windows DNS.
API Security Startup Neosec Launches With $20.7M Series A
Neosec, founded by the security experts behind LightCyber, aims to bring principles from extended detection and response to API security.
How Your Printer Is Like Swiss Cheese
Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
Magecart: How Its Attack Techniques Evolved
Shape-shifting Magecart has shown itself to be highly adaptable in its ability to compromise third-party websites, especially during the pandemic.
Outlining Risks to the World's Vital Cyber-Physical Systems
The key to protecting these systems is not only to ensure the control environment is secure and protected but also to deploy emerging technologies such as confidential computing.
In the Hybrid Future, Secure Everything Like You're Never Going Back
Security practices must change to reflect the reality that remote/hybrid work is the new norm. Here are three risk mitigation measures for a remote-first world.
First Initiatives for the First National Cyber Director
The US appointed Chris Inglis as the first National Cyber Director (NCD). Here are three key problems he must now address.
Microsoft Lets Users Fully Remove Account Passwords
Users can now delete passwords from their Microsoft account and instead use Windows Hello, Microsoft Authenticator, or physical security keys to log in.
Apple Patches Zero-Days in iOS 14.8 Update
An important security update addresses vulnerabilities in CoreGraphics and WebKit that may have been actively exploited.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Brute-Force Attacks, Vulnerability Exploits Top Initial Attack Vectors
A new analysis emphasizes how most security incidents can be avoided with strong patch management and password management policies.

How to Bust Through Barriers for a More Diverse Cybersecurity Workforce
Diversity is the topic du jour, but cybersecurity professionals of color still face a lot of hurdles to enter and grow within the industry. Organizations such as Blacks in Cybersecurity are providing some of these under-represented groups with a voice.

Name That Toon: Congrats! It's a ...
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

MORE
EDITORS' CHOICE

Groove Ransomware Gang Tries New Tactic to Attract Affiliates
The threat group, which leaked some 500,000 credentials for Fortinet SSL VPN devices, views ransomware as just one way to profit from compromised networks, experts say.
IAM Stakeholders: The Business Operations Point of View
As the number of identities managed by enterprise skyrockets, organizations are taking steps to better align security and identity.
LATEST FROM THE EDGE

A Ransomware Recovery Plan That's Solid Gold
Having a gold copy of critical data offline is essential in every organization's disaster recovery or continuity plan. Follow the 3-2-1-1 rule for creating and securing your organization's data.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Learn Why XDR Delivers Better Outcomes to Secure Your Endpoints

    Endpoint security continues to evolve. The increasing complexity of the threat landscape means we can no longer depend on next-gen antivirus (NGAV) or EDR (Endpoint Detection and Response) alone to protect against sophisticated attacks. It's well known that endpoint attacks ...

  • Ten Hot Talks from Black Hat 2021

    The annual Black Hat USA 2021 in Las Vegas featured a full slate of cybersecurity researchers presenting. They offered up discoveries about new critical security vulnerabilities, new threats, and new security tools that enterprise defenders need to know about as they ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.