Follow Dark Reading:
 July 30, 2019
LATEST SECURITY NEWS & COMMENTARY
Sextortion Email Scams Rise Sharply
Cybercriminals are increasingly trying to trick people into paying ransoms by threatening to expose compromising activities to friends and family.
Series of Zero-Day Vulnerabilities Could Endanger 200 Million Devices
Vulnerabilities in VxWorks' TCP stack could allow an attacker to execute random code, launch a DoS attack, or use the vulnerable system to attack other devices.
4 Network Security Mistakes Bound to Bite You
It's Shark Week again! Are you ready to outmaneuver sharks of the cyber variety? These tips can help.
A Security-First Approach to DevOps
Aware of the risks inherent in software, businesses are recognizing the need for application security.
Sephora Offers Monitoring Services in Wake of Data Breach
The data breach compromised data belonging to customers in parts of Southeast Asia, Australia, and New Zealand.
Deutsche Bank Email Vulnerability Left Ex-Employees with Access
Failures in computer and control systems are being blamed.
ASK THE EXPERT

How Can We Stop Ransomware From Spreading?
Here's how to stop them - or at least limit the systems it can reach.
MORE NEWS & COMMENTARY
HOT TOPICS
Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.

7 Stats That Show What It Takes to Run a Modern SOC
An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).

How Cybercriminals Break into the Microsoft Cloud
Microsoft and Trimarc researchers explore the most common attacks against the cloud and effective defenses and mitigation.

MORE
EDITORS' CHOICE

9 Things That Don't Worry You Today (But Should)
There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things.
NEW FROM THE EDGE

Farewell, Dear Password? The Future of Identity and Authorization
Many organizations, along with their tech teams, are questioning whether eliminating passwords as an authentication tool might augment their overall security posture.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • Threat Report: Autonomous Response

    This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.

  • Salary Survey: Can you spare 10 minutes?

    InformationWeek and Interop are putting together a comprehensive IT salary report and we need your help... Can you spare 10 minutes?

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.