Apple's updates included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections.
Follow Dark Reading:
 January 31, 2022
LATEST SECURITY NEWS & COMMENTARY
More Security Flaws Found in Apple's OS Technologies
Apple's updates this week included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections.
Navigating Nobelium: Lessons From Cloud Hopper & NotPetya
Nearly every organization should assume that it is at risk, but there are ways of countering the tactics used by advanced persistent threats.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Millions of Routers, IoT Devices at Risk as Malware Source Code Surfaces on GitHub
"BotenaGo" contains exploits for more than 30 vulnerabilities in multiple vendor products and is being used to spread Mirai botnet malware, security vendor says.

8 Security Startups to Watch in 2022
Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.

Threat Actors Use Microsoft OneDrive for Command-and-Control in Attack Campaign
Signs hint at Russia's APT28, aka Fancy Bear, being behind the attacks, according to new research.

MORE
EDITORS' CHOICE

Phishing Simulation Study Shows Why These Attacks Remain Pervasive
Email purportedly from human resources convinced more than one-fifth of recipients to click, the majority of whom did so within an hour of receiving the fraudulent message.
LATEST FROM THE EDGE

The Looming CISO Mental Health Crisis — and What to Do About It, Part 1
The next big threat to corporate security may not be a new strain of malware or innovative attacker tactics, techniques, and processes. It may be our own mental health.
LATEST FROM DR TECHNOLOGY

Energy Sector Still Needs to Shut the Barn Door
One third of the companies studied haven't fixed their credential management — the same issue that led to the Colonial Pipeline hack last May.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Developing an Effective Threat Intelligence Program for Your Enterprise

    There are many resources, both public and commercial, that collect information about current trends in online attacks. This "threat intelligence" can make it easier for security teams to prioritize their defense efforts and prepare for online exploits that are likely ...

  • 2021 DDoS Attack Trends: Year in Review

    2021 was an exceptionally busy year for attackers. From some of the largest volumetric DDoS attacks launched by historically large swarms of botnets, to massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world, DDoS ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.