Follow Dark Reading:
 March 03, 2018
LATEST SECURITY NEWS & COMMENTARY
Millions of Office 365 Accounts Hit with Password Stealers
Phishing emails disguised as tax-related alerts aim to trick users into handing attackers their usernames and passwords.
Mueller May Indict Russians Who Hacked DNC
Special counsel is compiling a case against the hackers who breached the DNC and John Podesta's email account, NBC News reports.
A Secure Development Approach Pays Off
Software security shouldn't be an afterthought. That's why the secure software development life cycle deserves a fresh look.
How & Why the Cybersecurity Landscape Is Changing
A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.
MORE NEWS & COMMENTARY
HOT TOPICS
Memcached Servers Being Exploited in Huge DDoS Attacks
Multiple vendors this week say they have seen a recent spike in UDP attacks coming in via port 11211.

SAML Flaw Lets Hackers Assume Users' Identities
Vulnerability affects single sign-on for SAML-reliant services including OneLogin, Duo Security, Clever, and OmniAuth.

6 Cybersecurity Trends to Watch
Expect more as the year goes on: more breaches, more IoT attacks, more fines...

MORE
EDITORS' CHOICE

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples
From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows.
What Enterprises Can Learn from Medical Device Security
In today's cloud-native world, organizations need a highly distributed approach that ties security to the workload itself in order to prevent targeted attacks.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Are you ready for GDPR?

    Discover how you can achieve your data privacy goals by viewing this on-demand webinar.

  • Cybersecurity Crash Course - Session 7: Security For IoT

    Today's IT environment increasingly employs a variety of devices that are intelligent and Internet-connected - but are not computers or phones. What's the best strategy for securing these devices as they are added to your corporate computing environment? Hear as ...

MORE WEBINARS

Partner Perspectives

A Sneak Peek at the New NIST Cybersecurity Framework
Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.

Journey to the Cloud: Overcoming Security Risks
Lessons learned from a global consultancy's 10-year transition from on-premises to 99% cloud-based infrastructure.

Virtual Private Networks: Why Their Days Are Numbered
As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.