MoonBounce is the latest in a small but growing number of implants found hidden in a computer's Unified Extensible Firmware Interface (UEFI).
Follow Dark Reading:
 January 21, 2022
LATEST SECURITY NEWS & COMMENTARY
Researchers Discover Dangerous Firmware-Level Rootkit
MoonBounce is the latest in a small but growing number of implants found hidden in a computer's Unified Extensible Firmware Interface (UEFI).
4 Ways to Develop Your Team's Cyber Skills
Organizations need to invest in professional development — and then actually make time for it.
Enterprises Are Sailing Into a Perfect Storm of Cloud Risk
Policy as code and other techniques can help enterprises steer clear of the dangers that have befallen otherwise sophisticated cloud customers.
Biden Broadens NSA Oversight of National Security Systems
New Cybersecurity National Security Memorandum will let the spy agency "identify vulnerabilities, detect malicious threat activity and drive mitigations," agency cybersecurity director says.
Red Cross Hit via Third-Party Cyberattack
The incident compromised the personal data and confidential information of more than 515,000 "highly vulnerable people," the Red Cross reports.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Researchers Explore Hacking VirusTotal to Find Stolen Credentials
VirusTotal can be used to collect large amounts of credentials without infecting an organization or buying them online, researchers found.

Cloud Adoption Widens the Cybersecurity Skills Gap
No matter what cloud services you employ, you are still responsible for protecting the security of your data.

Microsoft RDP Bug Enables Data Theft, Smart-Card Hijacking
The vulnerability was patched this week in Microsoft's set of security updates for January 2022.

MORE
EDITORS' CHOICE

Nigerian Police Arrest 11 Individuals in BEC Crackdown
More than 50,000 targets around the world have been affected by the business email compromise scams, Interpol reports.
LATEST FROM THE EDGE

Cisco's Helen Patton on the Security Outcomes Study
The latest installment of Edge Chats steps through the Security Outcomes Study and the activities that security practitioners believe lead to positive results with a security program.
LATEST FROM DR TECHNOLOGY

Automating Response Is a Marathon, Not a Sprint
Organizations should balance process automation and human interaction to meet their unique security requirements.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 2021 DDoS Attack Trends: Year in Review

    2021 was an exceptionally busy year for attackers. From some of the largest volumetric DDoS attacks launched by historically large swarms of botnets, to massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world, DDoS ...

  • Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code

    A good patch management process can help make your enterprise data more secure. But what does it do for vulnerabilities that haven't been patched? Attackers are increasingly manipulating open-source, third-party components in software -- do you have a process to ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.