Follow Dark Reading:
 September 22, 2017
LATEST SECURITY NEWS & COMMENTARY
SEC Says Intruders May Have Accessed Insider Data for Illegal Trading
2016 breach of the Securities and Exchange Commission's EDGAR database dents its reputation as a federal cybersecurity enforcer.
CCleaner Malware Targeted Tech Giants Cisco, Google, Microsoft
The backdoor discovered in Avast's CCleaner targeted top tech companies including Google, Microsoft, Samsung, Sony, VMware, and Cisco.
Why Size Doesn't Matter in DDoS Attacks
Companies both large and small are targets. Never think "I'm not big enough for a hacker's attention."
OPM Data Breach Lawsuit Tossed, Fed Plaintiffs will Appeal
A judge ruled federal employees cannot sue for damages from the 2015 Office of Personnel Management data breach.
SMBs Paid $301 Million to Ransomware Attackers
But small- to midsized businesses are taking a tougher stand against ransomware attacks, according to a survey released today of the 2016-2017 period.
Black Hat Europe 2017: First Briefings Announced
We are pleased to announce the first Briefings selected for presentation at Black Hat Europe 2017!
MORE NEWS & COMMENTARY
HOT TOPICS
Equifax Exec Departures Raise Questions About Responsibility for Breach
Disclosed details suggest a failure by the technology team but senior executives and the board are not above responsibility as well, experts say.

1.9 Billion Data Records Exposed in First Half of 2017
Every second, 122 records are exposed in breaches around the globe, a new report shows. And that's doesn't even include the new Equifax breach data.

New Spam Campaign Literally Doubles Down on Ransomware
An upgraded spam campaign alternates Locky and FakeGlobe ransomware, forcing victims to pay twice or lose all their data.

MORE
EDITORS' CHOICE

10 Hot Cybersecurity Funding Rounds in Q3
The first two quarters of 2017 have been the most active ever in five years from a cybersecurity investment standpoint. Here's how the third quarter has shaped up.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Security Implications of Using VoIP & SIP

    This webinar will examine the security implications of using VoIP and SIP, how to best protect real-time communications traffic with tools you already have as well as with new tools, and how to orchestrate protections to prevent UC security from ...

  • How to Talk to Your Management about IT Security

    This webinar will bring you some new methods for describing and measuring your cybersecurity initiatives so that they can be understood by even the most business-oriented executives.

MORE WEBINARS

Partner Perspectives

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

The Hunt for IoT: The Rise of Thingbots
Across all of our research, every indication is that today's "thingbots" - botnets built exclusively from Internet of Things devices - will become the infrastructure for a future Darknet.

Detection, Prevention & the Single-Vendor Syndrome
Why security teams need to integrate 'Defense in Depth' principles into traditional solutions designed with integration and continuity in mind.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.