Follow Dark Reading:
 August 02, 2021
LATEST SECURITY NEWS & COMMENTARY
Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.
Reports Point to Uptick in HTML Smuggling Attacks
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily deliver malware.
Next for Bug Bounties: More Open Source Funding
Ten years after kicking off its Vulnerability Rewards Program, Google sees another decade of bounties with a focus on shoring up open source projects.
The Power of Comedy for Cybersecurity Awareness Training
Cybersecurity is serious stuff, but the way we talk about it shouldn't be if we want people to pay attention and remember what they're taught.
What's Essential in an Incident Response Plan? Security Leaders Weigh In
A new report examines the must-have components of a security incident readiness and response playbook.
CISA Launches New Vulnerability Disclosure Policy Platform
The VDP platform provides a single website where agencies can intake, triage, and route the vulnerabilities that researchers disclose.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Hot Cyber Threat Trends to Expect at Black Hat
A sneak peek of some of the main themes at Black Hat USA next month.

US Government Unlikely to Ban Ransomware Payments
The Department of Justice believes that banning ransom payments will cause greater havoc. However, the agency has called for incident reporting to be required.

Why Your People Are the Best Untapped Security Strategy
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among employees.

MORE
EDITORS' CHOICE

8 Security Tools to be Unveiled at Black Hat USA
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
How Adversaries Still Target Microsoft Active Directory 20 Years Later
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
LATEST FROM THE EDGE

Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a new hybrid twist.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise

    Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ...

  • Two Sides of the PAM Coin

    There are two sides of the PAM (Privileged Access Management) Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches, but don't stop there! We ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.