Follow Dark Reading:
 April 26, 2018
LATEST SECURITY NEWS & COMMENTARY
The Default SAP Configuration That Every Enterprise Needs to Fix
Nine out of ten organizations are vulnerable to a 13-year-old flaw that puts their most critical business systems at risk of complete criminal takeover.
Diversity: It's About Inclusion
Unrealistic entry-level job requirements, black-hoodie hacker image problems are among the 'uncomfortable conversations' needed to remedy cybersecurity's diversity gap.
'Webstresser' DDoS Attack Site Shut Down in International Operation
Investigators arrested the admins of Webstresser, the world's largest DDoS marketplace reportedly responsible for more than four million attacks.
Google Adds Security Features to Gmail Face-lift
A redesigned Gmail brings new security measures to improve data protection and applications for artificial intelligence.
Low-Cost Crimeware Kit Gaining Popularity in Underground Markets
At $150 for a three-month subscription, Rubella Malware Builder presents a threat to enterprises, Flashpoint says.
Yahoo to Pay SEC Fine of $35 Million
While Yahoo senior management and legal team knew of the breach, the company failed to conduct due diligence for disclosing it to investors, the agency rules.
Free New Tool for Building Blockchain Skills
Blockchain CTF helps pros build skills with simulations.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Ways Hackers Monetize Stolen Data
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.

Threat Actors Turn to Blockchain Infrastructure to Host & Hide Malicious Activity
.bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says.

It's Time to Take GitHub Threats Seriously
There's a good chance your company has projects on the source code management system, but the casual way many developers use GitHub creates security issues.

MORE
EDITORS' CHOICE

Cybersecurity Buzz Phrase Bingo
The RSA Conference expo was chock full of vendors showing off their wares with language as colorful as the blinky lights on a SOC dashboard.
Despite Risks, Nearly Half of IT Execs Don't Rethink Cybersecurity after an Attack
A recent survey reveals a troubling degree of security inertia lurking among scores of organizations. But there are a few bright spots.
Tech Resources

Partner Perspectives

Cloud Misconceptions Are Pervasive Across Enterprises
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it.

IDS & IPS: Two Essential Security Measures
To protect business networks, one line of security isn't enough.

Researchers Discover Second rTorrent Vulnerability Campaign
This time attackers appears to have spoofed the Recording Industry Association of America (RIAA) and New York University (NYU) user-agents.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.