Follow Dark Reading:
 January 07, 2022
LATEST SECURITY NEWS & COMMENTARY
New Mac Malware Samples Underscore Growing Threat
A handful of malicious tools that emerged last year showed threat actors may be getting more serious about attacking Apple macOS and iOS environments.
Google Docs Comments Weaponized in New Phishing Campaign
Attackers use the comment feature in Google Docs to email victims and lure them into clicking malicious links.
CDN Cache Poisoning Allows DoS Attacks Against Cloud Apps
A Romanian researcher discovers more than 70 vulnerabilities in how applications and their content delivery networks handle cache misses that open the doors to denial-of-service attacks.
Rethinking Cybersecurity Jobs as a Vocation Instead of a Profession
The prevailing mindset is that security practitioners are professionals, and thus, require a college degree. But there are some flaws in that logic.
Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation
Zero trust, DevSecOps, and agile methodologies are critical in bridging the power of commercial multicloud environments and the security of private data centers.
New Mexico's Bernalillo County Investigates Ransomware Attack
A suspected ransomware attack has led Bernalillo County officials to take systems offline and sever network connections.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
In the Fight Against Cybercrime, Takedowns Are Only Temporary
Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it's far from a perfect strategy.

Attackers Exploit Log4j Flaws in Hands-on-Keyboard Attacks to Drop Reverse Shells
Microsoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely used Apache logging framework.

Why We Need To Reframe the False-Positive Problem
Efforts to tune or build behavior- or signature-based threat identification requires time and effort most organizations don't have.

MORE
EDITORS' CHOICE

New Attack Campaign Exploits Microsoft Signature Verification
The Malsmoke attack group is behind a campaign that has exploited the Microsoft e-signature verification tool to target 2,100 victims.
LATEST FROM THE EDGE

Enterprises Worry About Increased Data Risk in Cloud
The 2021 Strategic Security Survey highlights concerns related to the cloud environment, such as the ability to detect breaches and the increasing number of attacks against cloud systems.
LATEST FROM DR TECHNOLOGY

Darktrace's Dave Masson on Threats Against OT Networks

The latest episode of Tech Talk outlines the risks against operational technology with the OT/IT convergence and shift to the cloud.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Securing Your APIs: What You Need to Know

    Modern attack surfaces are evolving and morphing as API use is increasing. From car hire to medical records, APIs power applications that impact lives. Technical challenges and human error make it possible for vulnerable APIs to make their way into ...

  • Beyond Spam and Phishing: Emerging Email-based Threats

    Even as enterprises adopt real-time messaging tools and platforms, email remains the hub of enterprise communications. Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks. In this webinar, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.