Follow Dark Reading:
 January 11, 2022
LATEST SECURITY NEWS & COMMENTARY
No Significant Intrusions Related to Log4j Flaw Yet, CISA Says
But that could change anytime, officials warn, urging organizations to prioritize patching against the critical remote code execution flaw.
Microsoft: macOS 'Powerdir' Flaw Could Let Attackers Gain Access to User Data
The vulnerability could allow an attacker to bypass the macOS Transparency, Consent, and Control measures to access a user's protected data.
Breach Response Shift: More Lawyers, Less Cyber-Insurance Coverage
Companies are more likely to rely on outside attorneys to handle cyber response in order to contain potential lawsuits. Meanwhile, cyber-insurance premiums are rising but covering less.
The Evolution of Patch Management: How and When It Got So Complicated
In the wake of WannaCry and its ilk, the National Vulnerability Database arose to help security organizations track and prioritize vulnerabilities to patch. Part 1 of 3.

(Sponsored Article) Convergence Zone: CNAPP Aids in Integrated Cloud-Native Security

Cloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud-native applications across the full application life cycle.


FBI Warns FIN7 Campaign Delivers Ransomware via BadUSB
An FBI warning says the FIN7 cybercrime group has sent packages containing malicious USB drives to US companies in an effort to spread ransomware.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
New Mac Malware Samples Underscore Growing Threat
A handful of malicious tools that emerged last year showed threat actors may be getting more serious about attacking Apple macOS and iOS environments.

Attackers Exploit Log4j Flaws in Hands-on-Keyboard Attacks to Drop Reverse Shells
Microsoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely used Apache logging framework.

Why CIOs Should Report to CISOs
If the CISO is responsible for the security of the organization, then that same person also should be responsible for both security and IT infrastructure.

MORE
EDITORS' CHOICE

How to Proactively Limit Damage From BlackMatter Ransomware
Logic flaw exists in malware that can be used to prevent it from encrypting remote shares, security vendor says.
LATEST FROM THE EDGE

What Editing Crosswords Can Teach Us About Security Leadership
When security leaders look for mistakes, they often find them before customers do.
LATEST FROM DR TECHNOLOGY

Darktrace's Max Heinemeyer on Future of Ransomware
In this episode of Tech Talk, Max Heinemeyer, director of threat hunting at Darktrace, sits down with Dark Reading’s Terry Sweeney to discuss emerging ransomware trends and how they will impact the security landscape.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Securing Your APIs: What You Need to Know

    Modern attack surfaces are evolving and morphing as API use is increasing. From car hire to medical records, APIs power applications that impact lives. Technical challenges and human error make it possible for vulnerable APIs to make their way into ...

  • Beyond Spam and Phishing: Emerging Email-based Threats

    Even as enterprises adopt real-time messaging tools and platforms, email remains the hub of enterprise communications. Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks. In this webinar, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.