Follow Dark Reading:
 December 23, 2020
LATEST SECURITY NEWS & COMMENTARY
SolarWinds Campaign Focuses Attention on 'Golden SAML' Attack Vector
Adversaries that successfully execute attack can achieve persistent anytime, anywhere access to a victim network, security researchers say.
Emotet Campaign Restarts After Seven-Week Hiatus
Multiple security researchers note the return of an email campaign attempting to spread the malware, which is often used to drop the Ryuk ransomware and Trickbot banking Trojan.
Microsoft Ups Security of Azure AD, Identity
A roundup of Microsoft's recent security news and updates that focus on protecting identity.
Security as Code: How Repeatable Policy-Driven Deployment Improves Security
The SaC approach lets users codify and enforce a secure state of application configuration deployment that limits risk.
Prepare to Fight Upcoming Cyber-Threat Innovations
Cybercriminals are preparing to use computing performance innovations to launch new types of attacks.
Law Enforcement Disrupts VPN Services Enabling Cybercrime
The United States and international partners shut down three bulletproof hosting services used to facilitate criminal activity.
MORE NEWS & COMMENTARY
HOT TOPICS
Cisco, Intel, Deloitte Among Victims of SolarWinds Breach: Report
The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code.

7 Infamous Moments in Adobe Flash's Security History
End-of-life is here: Adobe's support for Flash is gone as of Jan. 1. Here's what we won't miss about the multimedia software platform.

2021 Cybersecurity Predictions: The Intergalactic Battle Begins
There's much in store for the future of cybersecurity, and the most interesting things aren't happening on Earth.

MORE
EDITORS' CHOICE

5 Key Takeaways From the SolarWinds Breach
New details continue to emerge each day, and there may be many more lessons to learn from what could be among the largest cyberattacks ever.
We Have a National Cybersecurity Emergency -- Here's How We Can Respond
Let's prioritize bipartisan strategic actions that can ensure our national security and strengthen the economy. Here are five ideas for how to do that.
LATEST FROM THE EDGE

5 Email Threat Predictions for 2021
As domains get cheaper, account takeovers get easier, and cloud computing usage expands, email-borne attacks will take advantage.
Tech Resources
ACCESS TECH LIBRARY NOW

  • A Radical Approach to Threat Intel Management

    What's the point of collecting tactical information that your team can't act on or map to what's happening in your environment? As a security leader, you need more from your cyber threat intelligence program.

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.