Apple's emergency fixes last week for two actively exploited vulnerabilities neglected previous Big Sur and Catalina versions of macOS, security vendor says.
Follow Dark Reading:
 April 07, 2022
LATEST SECURITY NEWS & COMMENTARY
Nearly 40% of Macs Left Exposed to 2 Zero-Day Exploits
Apple's emergency fixes last week for two actively exploited vulnerabilities neglected previous Big Sur and Catalina versions of macOS, security vendor says.
Zoom's Bug Bounty Programs Soar to $1.8M
Like other software-reliant firms, the company raised its rewards to spur additional scrutiny by security researchers.
FBI-Led Operation Disrupts Russian GRU Botnet
"Cyclops Blink" operation disabled firewalls behind the Sandworm hacking team's network of infected victim devices.
Why XDR As We Know It Will Fail
Don't take the XDR hype at face value. Do security due diligence and add a connectivity level for data access across all silos for best response.
Linux Systems Are Becoming Bigger Targets
To prevent Linux exploits, organizations should establish an integrated security approach that extends to the network edge.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Microsoft Details New Security Features for Windows 11
Security features to come include a TPM-like security processor for protecting artifacts that a computer uses during the secure boot-up process, as well as a control for blocking unsigned and untrusted apps.

What We Can Learn From Lapsus$ Techniques
The group is targeting the biggest weak spot in most security postures: finding anomalous behavior by authorized entities.

FIN7 Morphs into a Broader, More Dangerous Cybercrime Group
Mandiant has now tied the group to at least eight unattributed clusters of activity targeting organizations across various industries and regions.

MORE
EDITORS' CHOICE

Beware of These 5 Tax Scams
Fraudsters are out in full force as Tax Day approaches. Use this list to keep your company’s employees informed on what to watch out for this year.
LATEST FROM THE EDGE

Eliminating Passwords: One Way Forward
Fast Identity Online (FIDO) technology leverages security keys and biometrics to provide secure authentication.
LATEST FROM DR TECHNOLOGY

How DevOps Automation Solves Low-Code Security Issues
Three essential automated DevOps tools can increase the rate of deployment success, reduce errors, raise ROI, and improve data security.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Protecting Industrial Control Systems from Modern Threats

    A 2021 attack on an industrial control system (ICS) at a water treatment plant in a small town in Florida raised eyebrows and surfaced new fears about the risks these kind of systems face. Unfortunately, many ICS systems are working on ...

  • Network Security Approaches for a Multi-Cloud, Hybrid IT World

    Today's enterprise operates across multiple public cloud service provider networks and their corporate, private data centers. How do you enforce security controls consistently when your organization's sensitive information and accounts are scattered across different clouds and on-premise environments? How do ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.