Follow Dark Reading:
 May 07, 2021
LATEST SECURITY NEWS & COMMENTARY
New Techniques Emerge for Abusing Windows Services to Gain System Control
Organizations should apply principles of least privilege to mitigate threats, security researcher says.
Troy Hunt: Organizations Make Security Choices Tough for Users
The Have I Been Pwned founder took the virtual stage at Black Hat Asia to share stories about his work and industrywide challenges.
Cloud-Native Businesses Struggle With Security
More companies moved to cloud-native infrastructure in the past year, and security incidents and malware moved right along with them.
Biden's Supply Chain Initiative Depends on Cybersecurity Insights
Those helming the US supply chain executive order need to leverage standards, measurement, and the lessons cybersecurity leaders have learned.
Securing the Internet of Things in the Age of Quantum Computing
Internet security, privacy, and authentication aren't new issues, but IoT presents unique security challenges.
Google Plans to Automatically Enable Two-Factor Authentication
The company plans to automatically enroll users in two-step verification if their accounts are properly configured.
CISA Publishes Analysis on New 'FiveHands' Ransomware
Attackers used publicly available tools, FiveHands ransomware, and SombRAT to successfully target an organization, officials report.
MORE NEWS & COMMENTARY
HOT TOPICS
Hundreds of Millions of Dell Computers Potentially Vulnerable to Attack
Hardware maker has issued an update to fix multiple critical privilege escalation vulnerabilities that have gone undetected since 2009.

The Ticking Time Bomb in Every Company's Code
Developers must weigh the benefits and risks of using third-party code in Web apps.

Debating Law Enforcement's Role in the Fight Against Cybercrime
The FBI's action to remove Web shells from compromised Microsoft Exchange Servers sparks a broader discussion about officials' response to cyberattacks.

MORE
EDITORS' CHOICE

7 Modern-Day Cybersecurity Realities
Security pros may be working with a false sense of security. We explore seven places where old methods and techniques have to change to keep their organizations safe.
Can Organizations Secure Remote Workers for the Long Haul?
By focusing on protection instead of detection, organizations can defend against targeted attacks without compromising security or productivity.
LATEST FROM THE EDGE

How to Move Beyond Passwords and Basic MFA
It's not a question of whether passwordless is coming -- it's simply a question of when. How should your organization prepare? (Part two of a two-part series.)
Black Hat Asia Speakers Share Secrets About Sandboxes, Smart Doors, and Security
Find video interviews with some of the coolest Black Hat Asia experts right here, as part of the Dark Reading News Desk this week.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making XDR Work in Your Enterprise - May 12

    In this Dark Reading webinar, experts discuss the real-life implementation issues surrounding emerging detection and response technologies. You'll learn how these emerging technologies can be integrated with your existing cybersecurity tools, and how XDR technology might affect your cybersecurity operations ...

  • Web Security: Protecting Your Data from Internet Threats

    One of the most accessible methods of cracking your corporate data is through a simple Internet connection. In this webinar, experts offer a look at some of the most common ways that cyber attackers use to crack enterprise systems via ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.