Follow Dark Reading:
 January 27, 2021
LATEST SECURITY NEWS & COMMENTARY
Ransomware Disrupts Operations at Packaging Giant WestRock
Incident is another reminder of how vulnerable OT environments are to attack, security experts say.
North Korean Attackers Target Security Researchers via Social Media: Google
Google TAG warns the infosec community of unsolicited requests from individuals seeking collaboration on vulnerability research.
Pay-or-Get-Breached Ransomware Schemes Take Off
In 2020, ransomware attackers moved quickly to adopt so-called "double extortion" schemes, with more than 550 incidents in the fourth quarter alone.
Startup Offers Free Version of its 'Passwordless' Technology
Beyond Identity co-founders hope to move the needle in eliminating the need for passwords, but experts say killing passwords altogether won't be easy.
Privacy Teams Helped Navigate the Pivot to Work-from-Home
Annual Cisco privacy study also reports that 90% of organizations say their customers won't buy from them if they are not clear about data policy practices.
Mainframe Security Automation Is Not a Luxury
As cyber threats grow, even the most securable platform is vulnerable and requires adaptive autonomous protection.
Fighting the Rapid Rise of Cyber Warfare in a Changing World
Global cyber warfare is a grim reality, but strong public-private relationships and security frameworks can safeguard people, institutions, and businesses.
Mimecast: Recent Certificate Compromise Tied to SolarWinds Attacks
Yet another security firm hit in the sweeping attack campaign believed to be out of Russia.
BEC Scammers Find New Ways to Navigate Microsoft 365
Their techniques made use of out-of-office replies and automatic responses during the 2020 holiday season, researchers report.
MORE NEWS & COMMENTARY
HOT TOPICS
Critical Vulns Discovered in Vendor Implementations of Key OT Protocol
Flaws allow denial-of-service attacks and other malicious activity, Claroty says.

Breach Data Shows Attackers Switched Gears in 2020
Attackers focused more on ransomware, while the consolidation of data into large databases led to fewer reported breaches but more records leaked.

A Security Practitioner's Guide to Encrypted DNS
Best practices for a shifting visibility landscape.

MORE
EDITORS' CHOICE

How to Better Secure Your Microsoft 365 Environment
Security experts offer Microsoft 365 security guidance as more attackers target enterprise cloud environments.
2020's COVID Accelerated Digitalization Demands Stronger Cybersecurity in 2021
As critical infrastructure faces increasing and sophisticated attacks, these trends will enable the energy sector to shore up its cybersecurity defenses.
LATEST FROM THE EDGE

Learn SAML: The Language You Don't Know You're Already Speaking
Security Assertion Markup Language, a protocol most people use daily to log into applications, makes authentication easier for both admins and users. Here's what you need to know about SAML (and what it has to do with "GoldenSAML").
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.