Follow Dark Reading:
 October 20, 2020
LATEST SECURITY NEWS & COMMENTARY
NSS Labs Shuttered
The testing firm's website says it has "ceased operations" as of Oct. 15.
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
US Department of Justice charges members of Sandworm/APT28 for BlackEnergy, NotPetya, Olympic Destroyer, and other major attacks.
Microsoft Tops Q3 List of Most-Impersonated Brands
The technology sector was also the most likely targeted industry for brand phishing attacks, according to Check Point's latest report on brand phishing.
Trickbot, Phishing, Ransomware & Elections
The botnet has taken some hits lately, but that doesn't mean the threat is over. Here are some steps you can take to keep it from your door.
A New Risk Vector: The Enterprise of Things
Billions of devices -- including security cameras, smart TVs, and manufacturing equipment -- are largely unmanaged and increase an organization's risk.
IoT Vulnerability Disclosure Platform Launched
VulnerableThings.com is intended to help vendors meet the terms of a host of new international IoT security laws and regulations.
GravityRAT Spyware Targets Android & MacOS in India
The Trojan once used in attacks against Windows systems has been transformed into a multiplatform tool targeting macOS and Android.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Office 365 Accounts a Big Target for Attackers
Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.

What's Really Happening in Infosec Hiring Now?
As the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.

NIST Quantum Cryptography Program Nears Completion
The National Institute of Standards and Technology's first post-quantum cryptography standard will address key issues, approaches, an arms race, and the technology's uncertain future.

MORE
EDITORS' CHOICE

Trickbot Tenacity Shows Infrastructure Resistant to Takedowns
Both the US Cyber Command and a Microsoft-led private-industry group have attacked the infrastructure used by attackers to manage Trickbot -- but with only a short-term impact.
7 Tips for Choosing Security Metrics That Matter
Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.
NEW FROM THE EDGE

Expert Tips to Keep WordPress Safe
The most widely used content management system on the Web relies heavily on plug-ins and add-on software -- and that requires rigorous security measures at every level.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Dark Reading Virtual Event] Your Crash Course on Cyber Attackers

    This virtual event offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You'll get a look at some of the latest exploits used by today's cybercriminals, as well as their methods ...

  • Network Security: The Attacker's Point of View

    Over the years, IT organizations have approached network security from an enterprise point of view, establishing a perimeter of known devices and defending it with firewalls and security gateways. But today's online attackers often bypass these defenses, entering the network ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.