Follow Dark Reading:
 September 29, 2017
LATEST SECURITY NEWS & COMMENTARY
New Locky Ransomware Phishing Attacks Beat Machine Learning Tools
Late September attacks highlight the persistent nature of ransomware threats, Comodo says.
Ransomware Numbers Continue to Look Abysmal
Ransomware is one of the fastest-growing concerns among IT pros, according to several studies out this week.
Equihax: Identifying & Wrangling Vulnerabilities
Now that we know what was taken from Equifax, how it was taken, and what is being sold, what more do we need to learn before the next time?
Key Security Innovations Focus on Policy and Tech
The New York Cyber Task Force says strategic innovations, not only technical ones, have made the biggest difference.
Report: Bank Email Fraud Increases since Equifax Breach
Cyberthieves are impersonating banks to send bogus "secure" bank email messages.
Central Banks Propose Better Inter-Bank Security
Institutions from the world's largest economies want to improve security following abuse of inter-bank messaging and payment systems.
MORE NEWS & COMMENTARY
HOT TOPICS
Security's #1 Problem: Economic Incentives
The industry rewards cutting corners rather than making software safe. Case in point: the Equifax breach.

Breach at Deloitte Exposes Emails, Client Data
Intrusion may have resulted from company's failure to properly secure a key administrator account.

PassGAN: Password Cracking Using Machine Learning
Researchers demo how deep neural networks can be trained to generate passwords better than the best password-cracking tools.

MORE
EDITORS' CHOICE

7 SIEM Situations That Can Sack Security Teams
SIEMS are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.