Follow Dark Reading:
 August 19, 2021
LATEST SECURITY NEWS & COMMENTARY
Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization's Systems
Researchers went undercover and posed as willing "insider threats" to expose and study an unusual hybrid BEC-style social engineering-ransomware scheme.
More Than 47M Affected in T-Mobile Breach
T-Mobile has confirmed stolen records included account information for 7.8 million current customers and 40 million former or prospective customers.
Security Vendors Sound the Alarm on LockBit Ransomware's Return
Threat group claims version 2.0 of malware can encrypt 100 gigabytes of data twice as fast as its rivals.
How Much Cybersecurity Can $1.9 Billion Buy?
The bipartisan infrastructure bill will invest nearly $2 billion into cybersecurity, but security experts worry the sum is nowhere near enough.
The Emerging AI Security Threat: 4 Ways To Prepare
Artificial intelligence represents a huge opportunity for cybercriminals to wreak havoc and extort organizations as AI becomes more pervasive.
A 6-Step Checklist for a Successful & Secure Cloud Modernization
As organizations undergo digital transformation at an accelerating pace, teams should use this checklist to ensure the enterprise fully leverages a cloud modernization to gain scale, velocity, and agility without sacrificing security.
Confucius Targets Pakistani Military With Pegasus Spyware Lures
The threat group conducted a recent spear-phishing campaign that uses Pegasus spyware-related lures to trick victims into opening malicious files.
CISA Releases Guidance for Ransomware Defense & Response
Officials' recommendations include having encrypted backups and creating an incident response plan.
Name That Toon: Screen Time
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Steps to a More Secure Social Media Policy
Social media accounts must be viewed as part of the IT and security infrastructure. Follow these tips for developing a workable social media security program at your company.

It's Not Your Imagination: API and Web Security Is Getting Harder
With today's pace of rapid change, security must live everywhere that apps and APIs reside, and organizations can no longer rely on tools that weren't built with the decentralized enterprise in mind.

Zero-Day Flaw Found in Fortinet's FortiWeb WAF Technology
Vendor says it plans to have a patch for the vulnerability by this weekend.

MORE
EDITORS' CHOICE

Critical Vulnerability Affects Millions of IoT Devices
CISA, Mandiant, and ThroughTek share the details of a vulnerability that could allow attackers to observe camera feeds and remotely control devices.
Metrics That Matter: A Guide to Enhancing Security Reporting
Are your reports neglected or ignored? Up your game around the metrics you use to measure protection.
LATEST FROM THE EDGE

9 Tips for Hiring (and Keeping) Top Security Talent
Demand for security professionals continues to skyrocket. Here’s what organizations need to do to give themselves an edge in hiring and retaining the best talent out there.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.