Follow Dark Reading:
 October 03, 2019
LATEST SECURITY NEWS & COMMENTARY
New Silent Starling Attack Group Puts Spin on BEC
The West African cybergang has successfully infiltrated more than 500 companies using a tactic dubbed 'vendor email compromise.'
Millions More Embedded Devices Contain Vulnerable IPnet Software
FDA, DHS issue fresh warnings on easily exploitable URGENT/11 flaws in medical, SCADA systems, industrial controllers, and other devices.
MasterMana Botnet Shows Trouble Comes at Low Cost
For less than $200, attackers were able to infect thousands of systems, stealing user credentials, cryptocurrency wallets, and web histories, an analysis finds.
ReliaQuest Acquires Threatcare
Attack simulation tool will be integrated into ReliaQuest's GreyMatter platform.
Quantum-Safe Cryptography: The Time to Prepare Is Now
Quantum computing is real and it's evolving fast. Is the security industry up to the challenge?
Controlling Data Leakage in Cloud Test-Dev Environments
The focus on digital transformation and compressing development release cycles is appealing, but that means security can be left behind. How should security practitioners address this challenge?
Google's 'Password Checkup' Tool Tells You When Passwords Are Leaked
The feature will check the strength of saved passwords and alert users when they're compromised in a breach.
Stalkerware on the Rise Globally
Stalkware is being installed on more and more victims' devices, and the trend is only accelerating, according to a new report.
MORE NEWS & COMMENTARY
HOT TOPICS
Cybersecurity Certification in the Spotlight Again
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.

Cisco Webex & Zoom Bug Lets Attackers Spy on Conference Calls
The "Prying-Eye" vulnerability could let intruders scan for unprotected meeting IDs and snoop on conference calls.

Why You Need to Think About API Security
Businesses of all sorts are increasingly relying on APIs to interact with customers in smartphone apps, but they have their own unique set of vulnerabilities.

MORE
EDITORS' CHOICE

8 Microsegmentation Pitfalls to Avoid
Don't fall victim to these common mistakes on the path to developing better security boundaries and limiting the blast radius of security incidents.
AIOps: The State of Full Packet Capture Enters the Age of Practicality
How machine learning and artificial intelligence are changing the game of acting on large volumes of network data in near real time.
NEW FROM THE EDGE

How the City of Angels Is Tackling Cyber Devilry
A new mobile app makes a cybersecurity threat lab available to more small businesses in Los Angeles.
How Private Are You?
Think twice before posting about ... grits.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.