Follow Dark Reading:
 August 17, 2018
LATEST SECURITY NEWS & COMMENTARY
Necurs Botnet Goes Phishing for Banks
A new Necurs botnet campaign targets thousands of banks with a malicious file dropping the FlawedAmmyy remote-access Trojan.
Researcher Finds MQTT Hole in IoT Defenses
A commonly used protocol provides a gaping backdoor when misconfigured.
Active Third-Party Content the Bane of Web Security
New reports shows many of the world's most popular sites serve up active content from risky sources.
Overcoming 'Security as a Silo' with Orchestration and Automation
When teams work in silos, the result is friction and miscommunication. Automation changes that.
Facebook Awards $1M for Defense-Based Research
The company today awarded $200,000 to winners of the Internet Defense Prize after spending $800,000 on the Secure the Internet grants.
MORE NEWS & COMMENTARY
HOT TOPICS
Hacker Unlocks 'God Mode' and Shares the 'Key'
A researcher proves that it's possible to break the most fundamental security on some CPUs.

Microsoft ADFS Vulnerability Lets Attackers Bypass MFA
The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service.

NSA Brings Nation-State Details to DEF CON
Hackers were eager to hear the latest from the world of nation-state cybersecurity.

MORE
EDITORS' CHOICE

2018 Pwnie Awards: Who Pwned, Who Got Pwned
A team of security experts round up the best and worst of the year in cybersecurity at Black Hat 2018.
Open Source Software Poses a Real Security Threat
It's true that open source software has many benefits, but it also has weak points. These four practical steps can help your company stay safer.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How to End Phishing

    Are you suffering from agent overload, alert fatigue or the skills shortage? Do you need a better solution to document based phishing? If so, then this informative, interactive webinar is for you.

  • Strategies for Monitoring & Measuring Cloud Security

    Hear from an expert on how to monitor security when utilizing cloud apps & services.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.