The attack involved use of a new version of Industroyer tool for manipulating industrial control systems.
Follow Dark Reading:
 April 13, 2022
LATEST SECURITY NEWS & COMMENTARY
Russian Group Sandworm Foiled in Attempt to Disrupt Ukraine Power Grid
The attack involved use of a new version of Industroyer tool for manipulating industrial control systems.
80% of Software Codebases Contain at Least One Vulnerability
Open source code continues its steady takeover of codebases, and organizations have made slight gains in eliminating out-of-date and vulnerable components.
Microsoft Patches Windows Flaw Under Attack and Reported by NSA
"Go patch your systems before" the exploit spreads more widely, ZDI warns.
Building a Cybersecurity Mesh Architecture in the Real World
Like zero trust, the cybersecurity mesh re-envisions the perimeter at the identity layer and centers upon unifying disparate security tools into a single, interoperable ecosystem.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Google Removes Dangerous Banking Malware From Play Store
SharkBot was hidden in apps masquerading as antivirus tools.

Mandiant to Use CrowdStrike Technology in Its Incident Response Services
Collaboration between the two firms will help organizations better identify and protect against complexity cyberthreats, chief executives from both companies said.

What We Can Learn From Lapsus$ Techniques
The group is targeting the biggest weak spot in most security postures: finding anomalous behavior by authorized entities.

MORE
EDITORS' CHOICE

Creating a Security Culture Where People Can Admit Mistakes
In cybersecurity, user error is the symptom, not the disease. A healthy culture acknowledges and addresses the underlying causes of lapses.
LATEST FROM THE EDGE

Microsoft Plans Windows Auto-Update Service for Enterprises
Starting in July, the Windows Autopatch service will automatically patch all software bugs, including security updates, for Windows 10/11 Enterprise E3 customers, Microsoft says.
LATEST FROM DR TECHNOLOGY

How Do I Conduct a Resilience Review?
As the first step, make sure that all business-critical data across your organization is protected.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Protecting Industrial Control Systems from Modern Threats

    A 2021 attack on an industrial control system (ICS) at a water treatment plant in a small town in Florida raised eyebrows and surfaced new fears about the risks these kind of systems face. Unfortunately, many ICS systems are working on ...

  • Network Security Approaches for a Multi-Cloud, Hybrid IT World

    Today's enterprise operates across multiple public cloud service provider networks and their corporate, private data centers. How do you enforce security controls consistently when your organization's sensitive information and accounts are scattered across different clouds and on-premise environments? How do ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.