Sensitive data stolen on US weapons development and deployment, product development, foreign partnerships, contracts, and more.
Follow Dark Reading:
 February 16, 2022
LATEST SECURITY NEWS & COMMENTARY
Russian Actors Targeting US Defense Contractors in Cyber Espionage Campaign, CISA Warns
Sensitive data stolen on US weapons development and deployment, product development, foreign partnerships, contracts, and more.
Pixelating Text Leads to Information Leakage, Warns Firm
Blurring text isn't enough to obscure sensitive information. An offensive-security firm releases a tool showing how information can still be exposed.
Hybrid Work Accelerated Fraud; Now, CSOs Are Taking a Seat at the Executive Table
The days of security as a second-class citizen are over.
FBI: Cybercriminals Using Virtual Meeting Platforms to Wage BEC Attacks
Attackers are increasingly executing business email compromise (BEC) scams by impersonation of executives via virtual meetings.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Securonix Secures Over $1B in Growth Investment From Vista Equity
Deal is the second one topping $1 billion since November and sets the stage for what could be another record-breaking year for investment in the cybersecurity industry.

What CISOs Should Tell the Board About Log4j
It's time for a reset with the board of directors. Very few have a dedicated, board-level cybersecurity committee, which means cybersecurity isn't viewed as a critical executive function.

Google Cuts User Account Compromises in Half With Simple Change
The online tech giant auto-enabled two-step verification for more than 150 million users, throwing up steep hurdles against scammers and attackers.

MORE
EDITORS' CHOICE

8 of the Biggest Cybersecurity M&As & Investment Deals in 2021
There were more financial deals in cybersecurity last year than in any previous year.
LATEST FROM THE EDGE

Be Flexible About Where People Work — But Not on Data Privacy
If your policies don't keep up with your work models, your company's sensitive information could be at risk.
LATEST FROM DR TECHNOLOGY

Where AI Falls Down in Cybersecurity
Almost every cybersecurity product claims to incorporate AI. Sometimes, though, that's a mirage.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.