Follow Dark Reading:
 June 24, 2021
LATEST SECURITY NEWS & COMMENTARY
New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies
Researchers found a "novel" class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings that leak sensitive information on corporate and government customers, with one simple registration step.
VMs Help Ransomware Attackers Evade Detection, But It's Uncommon
Some ransomware attackers use virtual machines to bypass security detection, but adoption is slow for the complicated technique.
79% of Third-Party Libraries in Apps Are Never Updated
A lack of contextual information and concerns over application disruption among contributing factors.
When Will Cybersecurity Operations Adopt the Peter Parker Principle?
Having a prevention mindset means setting our prevention capabilities to "prevent" instead of relying on detection and response.
Expecting the Unexpected: Tips for Effectively Mitigating Ransomware Attacks in 2021
Cybercriminals continually innovate to thwart security protocols, but organizations can take steps to prevent and mitigate ransomware attacks.
Microsoft Tracks New BazaCall Malware Campaign
Attackers use emails to prompt victims to call a fraudulent call center, where attackers instruct them to download a malicious file.
MORE NEWS & COMMENTARY
HOT TOPICS
11 Security Certifications to Seek Out This Summer
The more you know, the more you grow. The Edge takes a fresh look at leading security certifications that can help advance your career.

Majority of Web Apps in 11 Industries Are Vulnerable All the Time
Serious vulnerabilities exist every day in certain industries, including utilities, public administration, and professional services, according to testing data.

7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Those looking to join the fight might want to polish up or acquire some (or all) of these hottest skills on the market.

Mission Critical: What Really Matters in a Cybersecurity Incident
The things you do before and during a cybersecurity incident can make or break the success of your response.

MORE
EDITORS' CHOICE

Survey Seeks to Learn How 2020 Changed Security
Respondents to a new Dark Reading/Omdia survey will be entered into a drawing for a Black Hat Black Card.
Does Your Cyberattack Plan Include a Crisis Communications Strategy? 5 Tips to Get Started
Don't overlook crisis communications in your cybersecurity incident response planning.
LATEST FROM THE EDGE

rMTD: A Deception Method That Throws Attackers Off Their Game
Through a variety of techniques, rotational Moving Target Defense makes existing OS and app vulnerabilities difficult to exploit. Here's how.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Threat Intelligence into Your Enterprise Security Strategy

    In recent years, many enterprises have discovered that they can improve their defenses by collecting data about broad trends in online attacks that may pertain to their own IT environments. This "threat intelligence" can make it easier for security teams ...

  • Weaknesses in Software Supply Chains: Cyber's Unspoken Reality

    Until the recent SolarWinds compromise, the conversation around supply chains - and more importantly, their vulnerabilities - was rarely discussed in the cybersecurity industry. However, over the last few years, supply chains have become an increasingly lucrative target for hackers. ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.