Follow Dark Reading:
 May 02, 2017
LATEST SECURITY NEWS & COMMENTARY
New Free Shodan Tool Roots Out RATs
Shodan teams up with Recorded Future to crawl the Net for computers serving as command-and-control (C2) for remote access Trojans (RATs).
Financial Services Sector the #1 Target of Cybercriminals
New IBM report finds the most frequently targeted industry in 2016 was financial services - where attacks increased 29% year-over-year.
Hackers Steal and Post Unreleased Episodes of Netflix's 'Orange is the New Black'
Netflix got hit with an extortion attempt for upcoming episodes of its popular "Orange Is the New Black" television series.
The Cyber-Committed CEO & Board
Here is what CISOs need to communicate to upper management about the business risks of mismanaging cybersecurity.
Cybersecurity Training Nonexistent at One-Third of SMBs
But nearly half of US SMBs in a new survey would be willing to participate in security awareness training at their workplace - even if it was optional.
One-Third of Federal Agencies Reported Data Breaches in 2016
Nearly all federal respondents surveyed consider themselves vulnerable and cite problems with security staffing and spending, a new report shows.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Cybercrime Myths that Could Cost You Millions
Don't let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.

Fileless Malware Attacks Continue to Gain Steam
Endpoint woes grow as fileless attacks grow in prevalence and file-based attacks remain largely undetected by AV engines.

New OWASP Top 10 Reveals Critical Weakness in Application Defenses
It's time to move from a dependence on the flawed process of vulnerability identification and remediation to a two-pronged approach that also protects organizations from attacks.

MORE
EDITORS' CHOICE

6 Steps to Find Your Next Dozen Cloud Security Experts
There's stiff competition for cloud security experts, but finding yours may actually be easier than you think.

Name That Toon: Screen Sharing

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Research Results Revealed: The State of Analytics

    How does your analytics initiative shape up? Are you keeping pace with your peers in other organizations? Do you have data scientists in lead roles? Are you driving innovation with data? Have you embarked on Internet of Things (IoT) projects? ...

  • Threat Intelligence: Fight Threats, Not Logs

    How to operationalize threat intelligence for protection & prevention. More is not always better. When it comes to data and threat intelligence, better prevention is offered via the right approach. Don't waste your resources by drowning them in a sea of ...

MORE WEBINARS

Partner Perspectives

OSX.Dok: New & Sophisticated Mac Malware Strikes
Phishing-deployed malware can capture account credentials for any website users log into.

Locky Returns with a New (Borrowed) Distribution Method
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.

Cybercrime Tactics & Techniques: Q1 2017
A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.