Poorly protected passwords in device configuration files present a risk of compromise, agency says.
Follow Dark Reading:
 February 18, 2022
LATEST SECURITY NEWS & COMMENTARY
NSA Issues Guidance for Selecting Strong Cisco Password Types
Poorly protected passwords in device configuration files present a risk of compromise, agency says.
Attackers Hone Their Playbooks, Become More Agile
Less malware, more interactive intrusions, and big game hunting lead to more success, with an 82% increase in ransomware-related data leaks.
4 Keys to Bridging the Gap Between Security and Developers
Security personnel's priority is protecting the organization. Developers are trying to hit tight timelines. Here's how both groups can get get their needs met.
Software-Developer Security Vendor Snyk Buys Cloud Security Company
Acquisition helps expand Snyk into the cloud security sector.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
8 of the Biggest Cybersecurity M&As & Investment Deals in 2021
There were more financial deals in cybersecurity last year than in any previous year.

Linux Malware on the Rise
Ransomware, cryptojacking, and a cracked version of the penetration-testing tool Cobalt Strike have increasingly targeted Linux in multicloud infrastructure, report states.

Ransomware Threat Intel: You're Soaking In It!
Organizations need to improve their ability to detect and prevent emerging ransomware attacks.

MORE
EDITORS' CHOICE

Russian Actors Targeting US Defense Contractors in Cyber Espionage Campaign, CISA Warns
Sensitive data stolen on US weapons development and deployment, product development, foreign partnerships, contracts, and more.
LATEST FROM THE EDGE

Security Teams Expect Attackers to Go After End Users First
Phishing, malware, and ransomware have spurred organizations to increase their investments in endpoint security, according to Dark Reading’s Endpoint Security Survey.
LATEST FROM DR TECHNOLOGY

Putting AI to Practical Use in Cybersecurity
Almost every cybersecurity product has an AI component. Here is where it's working in the real world.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.