Follow Dark Reading:
 December 31, 2020
LATEST SECURITY NEWS & COMMENTARY
The Coolest Hacks of 2020
Despite a pandemic and possibly the worst cyberattack campaign ever waged against the US, the year still had some bright spots when it came to "good" and creative hacks.
DDoS Attacks Spiked, Became More Complex in 2020
Global pandemic and the easy availability of for-hire services and inexpensive tool sets gave adversaries more opportunities to attack.
Mac Attackers Remain Focused Mainly on Adware, Fooling Users
Despite reports that Macs have encountered more threats than Windows systems, the platform still sees far fewer exploits and malware - including ransomware.
Remote Desktop Bugs: Patches That Took Priority in a Pandemic Year
Remote Desktop flaws were a patching priority this year as Microsoft distributed fixes and businesses scrambled to protect remote employees.
India: A Growing Cybersecurity Threat
Geopolitical tensions and a dramatic rise in offensive and defensive cyber capabilities lead India to join Iran, Russia, China, and North Korea as a top nation-state adversary.
Defending the COVID-19 Vaccine Supply Chain
We must treat this supply chain like a piece of our nation's critical infrastructure, just like the electrical grid or air traffic control system.
Mobile Endpoint Security: Still the Crack in the Enterprise's Cyber Armor
A combination of best practices and best-in-class technology will help keep your enterprise from falling victim to ever-growing threats.
MORE NEWS & COMMENTARY
HOT TOPICS
Amazon Gift Card Scam Delivers Dridex This Holiday Season
Dridex operators launch a social engineering scam that promises victims a $100 gift card but delivers a banking Trojan.

SolarWinds Campaign Focuses Attention on 'Golden SAML' Attack Vector
Adversaries that successfully execute attack can achieve persistent anytime, anywhere access to a victim network, security researchers say.

5 Email Threat Predictions for 2021
As domains get cheaper, account takeovers get easier, and cloud computing usage expands, email-borne attacks will take advantage.

MORE
EDITORS' CHOICE

5 Key Takeaways From the SolarWinds Breach
New details continue to emerge each day, and there may be many more lessons to learn from what could be among the largest cyberattacks ever.
10 Benefits of Running Cybersecurity Exercises
There may be no better way to ascertain your organization's strengths and weaknesses than by running regular security drills.
LATEST FROM THE EDGE

Homomorphic Encryption: The 'Golden Age' of Cryptography
The ability to perform complex calculations on encrypted data promises a new level of privacy and data security for companies in the public and private sectors. So when can they get started?
Tech Resources
ACCESS TECH LIBRARY NOW

  • The Pesky Password Problem: Policies That Help You Gain the Upper Hand on the Bad Guys

    Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, to find out what your password policy should be and learn about the common mistakes organizations make when creating password policy.

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.