Follow Dark Reading:
 October 11, 2018
LATEST SECURITY NEWS & COMMENTARY
New Threat Group Conducts Malwareless Cyber Espionage
Gallmaker group is relying exclusively on legitimate tools and living-off-the-land tactics to make detection very difficult.
IIS Attacks Skyrocket, Hit 1.7M in Q2
Drupal and Oracle WebLogic also were hit with more cyberattacks during same quarter.
Imperva to Be Acquired by Thoma Bravo for $2.1 Billion
But two law firms are investigating whether the security vendor breached its fiduciary duty to shareholders by not actively seeking buyers offering a higher price.
Russian Hacking Groups Intersect in Recent Cyberattacks
Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.
Security Researchers Struggle with Bot Management Programs
Bots are a known problem, but researchers will tell you that bot defenses create problems of their own when it comes to valuable data.
MORE NEWS & COMMENTARY
HOT TOPICS
Teach Your AI Well: A Potential New Bottleneck for Cybersecurity
Artificial intelligence (AI) holds the promise of easing the skills shortage in cybersecurity, but implementing AI may result in a talent gap of its own for the industry.

6 Security Training Hacks to Increase Cyber IQ Org-Wide
Move beyond generic, annual security awareness training with these important tips.

7 Most Prevalent Phishing Subject Lines
The most popular subject lines crafted to trick targets into opening malicious messages, gleaned from thousands of phishing emails.

MORE
EDITORS' CHOICE

Meet 5 Women Shaping Microsoft's Security Strategy
Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity.
12 AppSec Activities Enterprises Can't Afford to Skip
The latest Building Security in Maturity Model (BSIMM9) report offers a statistically backed, bare-minimum benchmark for software security initiatives.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.