Follow Dark Reading:
 April 30, 2021
LATEST SECURITY NEWS & COMMENTARY
Researchers Connect Complex Specs to Software Vulnerabilities
Following their release of 70 different vulnerabilities in different implementations of TCP/IP stacks over the past year, two companies find a common link.
XDR Pushing Endpoint Detection and Response Technologies to Extinction
Ironically, EDR's success has spawn demand for technology that extends beyond it.
Adobe Open Sources Tool for Anomaly Research
The One-Stop Anomaly Shop (OSAS) project packages machine-learning algorithms into a Docker container for finding anomalies in security log data.
Your Digital Identity's Evil Shadow
In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.
The Challenge of Securing Non-People Identities
Non-people identities, which can act intelligently and make decisions on behalf of a person's identity, are a growing cybersecurity risk.
API Hole on Experian Partner Site Exposes Credit Scores
Student researcher is concerned security gap may exist on many other sites.
'BadAlloc' Flaws Could Threaten IoT and OT Devices: Microsoft
More than 25 critical memory allocation bugs could enable attackers to bypass security controls in industrial, medical, and enterprise devices.
MORE NEWS & COMMENTARY
HOT TOPICS
FluBot Malware's Rapid Spread May Soon Hit US Phones
The FluBot Android malware has spread throughout several European countries through an SMS package delivery scam.

In Appreciation: Dan Kaminsky
Beloved security industry leader and researcher passes away unexpectedly at the age of 42.

10K Hackers Defend the Planet Against Extraterrestrials
Hack the Planet's Cyber Apocalypse capture-the-flag contest attracts 10,000 competitors from across the globe.

MORE
EDITORS' CHOICE

10 Free Security Tools at Black Hat Asia 2021
Researchers are set to demonstrate a plethora of tools for conducting pen tests, vulnerability assessments, data forensics, and a wide range of other use cases.
Is Your Cloud Raining Sensitive Data?
Learn common Kubernetes vulnerabilities and ways to avoid them.
LATEST FROM THE EDGE

Cartoon Caption Winner: Rough Patch?
And the winner of The Edge's April cartoon caption contest is ...
Tech Resources
ACCESS TECH LIBRARY NOW

  • Web Security: Protecting Your Data from Internet Threats

    One of the most accessible methods of cracking your corporate data is through a simple Internet connection. In this webinar, experts offer a look at some of the most common ways that cyber attackers use to crack enterprise systems via ...

  • Keys to Better Cyber Risk Assessment

    At this Dark Reading webinar, learn about the costs associated with today's threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.