Actinium/Gameredon's attacks are another reminder of why organizations need to pay additional scrutiny to systems in the region.
Follow Dark Reading:
 February 08, 2022
LATEST SECURITY NEWS & COMMENTARY
Russian APT Steps Up Malicious Cyber Activity in Ukraine
Actinium/Gameredon's attacks are another reminder of why organizations need to pay additional scrutiny to systems in the region.
Log4j: Getting From Stopgap Remedies to Long-Term Solutions
This pervasive vulnerability will require continued care and attention to fully remediate and detect permutations. Here are some ways to get started.

(Sponsored Article) The Future of Cybersecurity: Our Predictions for 2022

New technologies and workplace trends are fueling a global explosion in cybercrime. Discover the threats to watch out for in 2022.


FBI Publishes Indicators of Compromise for LockBit 2.0 Ransomware
Flash bulletin alert includes mitigation strategies for defending against the ransomware.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
The 3 Most Common Causes of Data Breaches in 2021
Phishing, smishing, and business email compromise continue to do their dirty work.

7 Privacy Tips for Security Pros
How best to integrate privacy into your organization's security program.

Want to Be an Ethical Hacker? Here's Where to Begin
By utilizing these resources, beginner hackers can find their specific passions within the cybersecurity space and eventually make their own mark in the ethical hacking profession.

MORE
EDITORS' CHOICE

China-Linked Group Attacked Taiwanese Financial Firms for 18 Months
The Antlion group, also known as Pirate Panda and Tropic Trooper, has shifted to targeting mainly Taiwan, using custom backdoors against financial organizations.
LATEST FROM THE EDGE

Name That Edge Toon: Head of the Table
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
LATEST FROM DR TECHNOLOGY

Big Pharma Finds Patch Management a Bitter Pill
One-quarter of pharmaceutical manufacturers received a failing grade on patch management, which is a vital step in heading off ransomware attacks.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

  • Best Practices for Extending Identity & Access Management to the Cloud

    Managing and securing user credentials was never easy, and now that they are scattered across cloud platforms, software-as-a-service tools, mobile devices, and on-premises systems, the task has become even more complex. With adversaries increasingly targeting their attention to credential theft, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.