Microsoft meanwhile confirms Lapsus$ group compromised it as well and issues warning on threat actor.
Follow Dark Reading:
 March 24, 2022
LATEST SECURITY NEWS & COMMENTARY
Okta Says 366 Customers Impacted via Third-Party Breach
Microsoft meanwhile confirms Lapsus$ group compromised it as well and issues warning on threat actor.
F-Secure Rebrands as WithSecure, Spins Off Consumer Products
Attempting to catch up with CrowdStrike, Microsoft, and Trend Micro, the Helsinki-based endpoint-protection firm "de-merges" its consumer-security business to focus on businesses.
Building a Red Team: How to Get Started
These groups of authorized hackers work to infiltrate their customer's data, development environment, or any other business area to locate and identify vulnerabilities.
Cyber Insurance and War Exclusions
Here's what a cybersecurity lawyer thinks security pros need to know in light of Russia's invasion of Ukraine.
FBI: Cybercrime Victims Suffered Losses of Over $6.9B in 2021
The Internet Crime Complaint Center fielded 847,376 cybercrime reports last year, an increase of 7% from 2020.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Ransomware Group Claims Major Okta Breach
Screenshots that ransomware gang Lapsus$ released this week suggest the threat actor also stole Microsoft source code.

'Unique Attack Chain' Drops Backdoor in New Phishing Campaign
A threat group combines the use of steganography, open source tools, and Python scripts to target organizations in France.

Name That Toon: Sleep Like a Baby
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

MORE
EDITORS' CHOICE

6 Reasons Not to Pay Ransomware Attackers
Paying a ransom might appear to be the best option, but it comes with its own costs.
LATEST FROM THE EDGE

Could Gaming Close the Cyberskills Gap?
The Wicked6 hackathon helps women to develop their professional cybersecurity skills while networking and playing games.
LATEST FROM DR TECHNOLGY

Vade Receives Patent on Anti-Phishing Tech
The patent covers a technique to detect phishing kits even as the kits utilize defensive mechanisms to avoid detection.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How To Get Ahead Of The Security Data Curve -- And Stay There

    Security teams are overwhelmed with incident data, alerts, and log files. Each endpoint and each application generates its own set of data. How are security teams supposed to make sense of all the data they have? In this webinar, experts ...

  • Rethinking Asset Management to Improve Enterprise Security

    One common reason behind many enterprise security breaches is that attackers found a system, application, or device that security teams didn't know they had. Attackers can tamper with these unknown systems to make them look legitimate, and security defenders may ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.