Follow Dark Reading:
 August 26, 2020
LATEST SECURITY NEWS & COMMENTARY
Phishing Attack Used Box to Land in Victim Inboxes
A phishing attack targeting government and security organizations used a legitimate Box page with Microsoft 365 branding to trick victims.
The Fatal Flaw in Data Security
Simply stated: No matter how sophisticated your security software is, data cannot be simultaneously used and secured. But that may be changing soon.
Three Easy Ways to Avoid Meow-like Database Attacks
The largest problem facing database security today is the disconnect between security teams and DBAs beginning from the moment of configuration and continuing throughout the database lifecycle.
Online Business Fraud Down, Consumer Fraud Up
Criminals are changing tactics to match changing business conditions in the coronavirus pandemic, according to a new report.
Palo Alto Networks to Acquire The Crypsis Group for $265M
This is the latest in a series of acquisitions that Palo Alto has made since 2018.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
Cryptominer Found Embedded in AWS Community AMI
Researchers advise Amazon Web Services users running Community Amazon Machine Images to verify them for potentially malicious code.

MFA Mistakes: 6 Ways to Screw Up Multifactor Authentication
Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here's what they need to know.

MITRE Releases 'Shield' Active Defense Framework
Free knowledge base offers techniques and tactics for engaging with and better defending against network intruders.

MORE
EDITORS' CHOICE

10 Resume and Interview Tips from Security Pros
Experts from the DEF CON Career Hacking Village explain how job seekers can build a resume and rock an interview.
Why Quality & Security Both Matter in Software
It's time to position quality and security as equals under the metric of software integrity.
NEW FROM THE EDGE

Election Security's Sticky Problem: Attackers Who Don't Attack Votes
If election defenders are protecting votes, and adversaries are attacking something else entirely, both sides might claim success, "Operation BlackOut" simulation shows.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.