Follow Dark Reading:
 August 19, 2021
LATEST SECURITY NEWS & COMMENTARY
More Than 47M Affected in T-Mobile Breach
T-Mobile has confirmed stolen records included account information for 7.8 million current customers and 40 million former or prospective customers.
Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization's Systems
Researchers went undercover and posed as willing "insider threats" to expose and study an unusual hybrid BEC-style social engineering-ransomware scheme.
Critical Vulnerability Affects Millions of IoT Devices
CISA, Mandiant, and ThroughTek share the details of a vulnerability that could allow attackers to observe camera feeds and remotely control devices.
FireEye Launches XDR Platform
FireEye debuts its new flagship product following the sale of its products business to Symphony Technology Group for $1.2 billion.
Troubling New Disk-Level Encryption Ransomware Surfaces
"DeepBlueMagic" also deletes Volume Shadow copy for Windows, making recovery all but impossible without a decryption key.
Cost of Cyberattacks Significantly Higher for Smaller Healthcare Organizations
Significant oversights, such as lack of automation and continued vulnerability to old threats, leave healthcare organizations at risk.
Google Releases Tool to Help Developers Enforce Security
The AllStars tool allows software maintainers to automatically check specific facets of their project, such as security policy.

Zero-Day Flaw Found in Fortinet's FortiWeb WAF Technology

Vendor says it plans to have a patch for the vulnerability by this weekend.


Contain a Ransomware Attack Before It Spreads

While ransomware attacks can be difficult to proactively prevent, enterprises can stop them from spreading and avoid extensive damage by implementing several key defensive measures.


Online Businesses Become a Phisher's Playground
A global shift to online business this year has led to an increase in phishing attacks through website builders and CMS platforms. But not nearly enough businesses have deployed sufficient security measures against these campaigns.
It's Not Your Imagination: API and Web Security Is Getting Harder
With today's pace of rapid change, security must live everywhere that apps and APIs reside, and organizations can no longer rely on tools that weren't built with the decentralized enterprise in mind.
SOC Investment Leads to Improved Incident Response Times
Dark Reading’s 2021 Incident Response Survey reveals an upswing in SOC capabilities with promising results.
Name That Toon: Screen Time
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Steps to a More Secure Social Media Policy
Social media accounts must be viewed as part of the IT and security infrastructure. Follow these tips for developing a workable social media security program at your company.

Attackers Change Their Code Obfuscation Methods More Frequently
Microsoft spotted a campaign that changed its encoding mechanism at least 10 times in the past year to evade detection — even using Morse code as one method.

Partnering With the Legal Team on OT Cybersecurity
With proper coordination, legal counsel can be a key partner for security teams, helping them make headway on their OT vulnerabilities while limiting legal risk.

MORE
EDITORS' CHOICE

Ransomware Attacks and Payment Demands Soar
In the past 12 months, 30% of ransom demands topped $30 million, but victims who negotiated were able to drive demands down significantly.
The Emerging AI Security Threat: 4 Ways To Prepare
Artificial intelligence represents a huge opportunity for cybercriminals to wreak havoc and extort organizations as AI becomes more pervasive.
LATEST FROM THE EDGE

9 Tips for Hiring (and Keeping) Top Security Talent
Demand for security professionals continues to skyrocket. Here’s what organizations need to do to give themselves an edge in hiring and retaining the best talent out there.
Tech Resources
ACCESS TECH LIBRARY NOW

  • "The New Normal" of Supply Chain Security

    In this webinar, experts discuss potential vulnerabilities in the new supply chain, and potential threats from online attackers. They also discuss the impact of these changes on compliance with industry and regulatory rules that govern the supply chain. You'll learn ...

  • External Threat Hunting - Reduce Supply Chain Risk

    In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.