Follow Dark Reading:
 April 27, 2018
LATEST SECURITY NEWS & COMMENTARY
North Korea Ramps Up 'Operation GhostSecret' Cyber Espionage Campaign
Critical infrastructure, entertainment, finance, healthcare, telecoms, among recent targets of the Lazarus Group, aka Hidden Cobra.
How Microsoft, Amazon, Alphabet Are Reshaping Security
Tech's biggest giants are shifting the cybersecurity landscape as they incorporate security into their products and services.
US Healthcare Firms Among Dozens Hit in 'Orangeworm' Cyberattack Campaign
Attackers target healthcare organizations in apparent data theft mission, but could do far more damage, according to Symantec researchers.
Why Hackers Love Healthcare
The migration of valuable data to the cloud is piquing the interest of cybercrimimals. But there are ways to fight back.
MyEtherWallet DNS Attack Offers Opt-In Lessons
Attackers poisoned BGP route tables to redirect Amazon's Route 53 name servers to their malicious servers.
New Phishing Attack Targets 550M Email Users Worldwide
In an attempt to steal financial data, the attack bribes users with coupons in exchange for taking an online quiz.
Routing Security Gets Boost with New Set of MANRS for IXPs
The Internet Society debuts a new mutually agreed norms initiative for IXPs.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Ways Hackers Monetize Stolen Data
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.

Threat Actors Turn to Blockchain Infrastructure to Host & Hide Malicious Activity
.bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says.

It's Time to Take GitHub Threats Seriously
There's a good chance your company has projects on the source code management system, but the casual way many developers use GitHub creates security issues.

MORE
EDITORS' CHOICE

12 Trends Shaping Identity Management
As IAM companies try to stretch 'identity context' into all points of the cybersecurity market, identity is becoming 'its own solar system.'

Name That Toon: Threat Landscape

We provide the cartoon. You write the caption. Enter to win a $25 Amazon gift card.


Tech Resources

Partner Perspectives

Europe and Asia Take on More DDoS Attacks
While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inception, that trend changed in 2017.

Cloud Misconceptions Are Pervasive Across Enterprises
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it.

IDS & IPS: Two Essential Security Measures
To protect business networks, one line of security isn't enough.

FEATURED REPORTS
  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

  • [Strategic Security Report] Cloud Security's Changing Landscape

    The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.