Follow Dark Reading:
 May 01, 2020
LATEST SECURITY NEWS & COMMENTARY
Researchers Find Vulnerabilities in Popular Remote Learning Plug-ins
As more students move to online learning platforms, vulnerability researchers are revealing security flaws in some common software plug-ins.
Healthcare Targeted By More Attacks But Less Sophistication
An increase in attacks targeting healthcare organizations suggests that perhaps new cybercriminals are getting into the game.
User-Friendly Cybersecurity: Is a Better UX the Key to a Better Defense?
Frictionless security, improved interfaces, and more usable design may improve the efficacy of security tools and features (and make life easier for users and infosec pros alike). So why has there been so much resistance?
Researchers Find Baby Banking Trojan, Watch It Grow
EventBot is an Android information stealer on its way to becoming a very capable piece of malware.
Microsoft's Records Management Tool Aims to Simplify Data Governance
Records Management is intended to help businesses manage security and data governance as more struggle to handle increased amounts of data and regulatory requirements.
Things Keeping CISOs Up at Night During the COVID-19 Pandemic
Insights from discussions with more than 20 CISOs, CEOs, CTOs, and security leaders.
The Rise of Deepfakes and What That Means for Identity Fraud
Convincing deepfakes are a real concern, but there are ways of fighting back.
Ed-Tech Company Chegg Suffers Third Breach Since 2018
The latest incident compromised names, Social Security numbers, and other data belonging to 700 current and former Chegg employees.
MORE NEWS & COMMENTARY
HOT TOPICS
Web Shells Continue to Threaten
A decade after their first use, Web shells remain a common tool for all stripes of attackers, from common cybercriminals to sophisticated state actors.

Phishers Start to Exploit Oil Industry Amid COVID-19 Woes
While a massive flood of attacks has yet to materialize, cybersecurity experts say this could be the calm before the storm.

Top 10 Cyber Incident Response Mistakes and How to Avoid Them
From lack of planning to rushing the closure of incidents, these mistakes seriously harm IR effectiveness.

MORE
EDITORS' CHOICE

COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
7 Secure Remote Access Services for Today's Enterprise Needs
Secure remote access is a "must" for enterprise computing today, and there are options for you to explore in the dynamic current environment.
NEW FROM THE EDGE

Election Security in the Age of Social Distancing
Although the controversial option of voting by mobile app is one pressing consideration, cybersecurity experts agree that older issues need to be resolved before November 3.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Red Team Realities: Testing that goes beyond compliance

    Using real-world anecdotes, this webinar will illustrate how to navigate a decision-making process aligned to use cases and desired outcomes tailored to your organization's needs. Listen as we discuss the different levels of cybersecurity assessments, and help you determine which ...

  • Building and Managing an Effective Mobile Security Strategy

    In this webinar, attendees will get advice on how to build a sound, effective mobile security strategy that works across locations and devices --and that can be enforced across the enterprise.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.