Follow Dark Reading:
 September 22, 2021
LATEST SECURITY NEWS & COMMENTARY
New Cooperative's Ransomware Attack Underscores Threat to Food & Agriculture
The Iowa grain cooperative took its systems offline in response to a security incident earlier this week.
CTO 2.0: Maiffret Rejoins BeyondTrust
Hacker-turned-entrepreneur Marc Maiffret reflects on his past few years "embedded" with enterprise security teams and how it has shaped his security view.
Elizabeth Kolade on How AI Is a 'Double-Edged Sword' & the Challenge of Harmonizing Cyber and Physical Security
An analyst at the Defence Space Administration, Nigeria, Elizabeth Kolade was named in the list of 'One to watch: Security' for the IFSEC Global Influencers in Security and Fire 2021. Julian Hall put some quickfire questions to her on the trends and issues she's witnessing in the sector.
Why Cryptomining Malware Is a Harbinger of Future Attacks
Crypto thieves rely on users not noticing installation of their tiny payload on thousands of machines, or the CPU cycles being siphoned off to perpetuate the schemes.
US Treasury Dept. Sanctions Suex Cryptocurrency Exchange
Sanctions are a result of Suex's role in facilitating transactions for ransomware attackers., officials say.
Data Sharing, Added Security Steps Drive Consumers to Shop Elsewhere
A new survey finds most shoppers will stop a transaction if asked for too much personal information or to complete many security steps.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
OMIGOD: Azure Users Warned of Critical OMI Vulnerabilities
Security researchers share the details of four flaws in Open Management Infrastructure, which is deployed on a large number of Linux virtual machines in Azure.

White House Cybersecurity Summit: A Missed Opportunity
Last month's summit with the president was missing something crucial: representation from those who deal with critical infrastructure.

MORE
EDITORS' CHOICE

Open Source Software Projects Up Their Security Game but Face More Attacks
Patches for dependencies are trickling up through the open source ecosystem faster than ever — a good thing because attackers are focusing more on open source software.
OWASP Reshuffles Its Top 10 List, Adds New Categories
The Open Web Application Security Project reshuffles its list of top threats, putting broken access controls and cryptographic failures at the top and creating three new risk categories.
LATEST FROM THE EDGE

10 Threat Trends in DNS Security

Cisco Security examines Cisco Umbrella data for trends in malicious DNS activity during 2020.


10 Ways to Avoid Zero-Trust Failure
Here are the prerequisites to have in order before getting past the zero-trust gate.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Defense Strategies to Combat Sophisticated Ransomware and Multi-Vector Attacks

    To defend themselves effectively, companies need to detect ransomware attacks early, gather the intelligence to understand the attack and prevent attacks from occurring in the future. In this webinar, Shailesh Athalye, EVP Product Management will discuss ransomware trends, defensive maneuvers ...

  • Learn Why XDR Delivers Better Outcomes to Secure Your Endpoints

    Endpoint security continues to evolve. The increasing complexity of the threat landscape means we can no longer depend on next-gen antivirus (NGAV) or EDR (Endpoint Detection and Response) alone to protect against sophisticated attacks. It's well known that endpoint attacks ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.