Follow Dark Reading:
 July 09, 2021
LATEST SECURITY NEWS & COMMENTARY
The NSA's 'New' Mission: Get More Public With the Private Sector
The National Security Agency's gradual emergence from the shadows was "inevitable" in cybersecurity, says Vinnie Liu, co-founder and CEO of offensive security firm Bishop Fox and a former NSA analyst. Now the agency has to figure out how to best work with the private sector, especially organizations outside the well-resourced and seasoned Fortune 100.
Kaseya Hacked via Authentication Bypass
The Kaseya ransomware attack is believed to have been down to an authentication bypass. Yes, ransomware needs to be on your radar -- but good authentication practices are also imperative.
What Colonial Pipeline Means for Commercial Building Cybersecurity
Banks and hospitals may be common targets, but now commercial real estate must learn to protect itself against stealthy hackers.
Morgan Stanley Discloses Data Breach
Attackers were able to compromise customers' personal data by targeting the Accellion FTA server of a third-party vendor.
New WildPressure Malware Capable of Targeting Windows and MacOS
The Trojan sends information back to the attackers' servers about the programming language of a target device.
MORE NEWS & COMMENTARY
HOT TOPICS
Researchers Learn From Nation-State Attackers' OpSec Mistakes
Security researchers discuss how a series of simple and consistent mistakes helped them learn more about ITG18, better known as Charming Kitten.

It's High Time for a Security Scoring System for Applications and Open Source Libraries
A benchmarking system would help buyers choose more secure software products and, more importantly, light a fire underneath software producers to make products secure.

9 Hot Trends in Cybersecurity Mergers & Acquisitions
Security experts share their observations of the past year in cybersecurity M&A, highlighting key trends and notable deals.

MORE
EDITORS' CHOICE

Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Automation allowed a REvil affiliate to move from exploitation of vulnerable servers to installing ransomware on downstream companies faster than most defenders could react.
8 Ways to Preserve Legal Privilege After a Cybersecurity Incident
Knowing your legal distinctions can make defense easier should you end up in court after a breach, attack, or data loss.
LATEST FROM THE EDGE

Security 101: The 'PrintNightmare' Flaw
A closer look at the printer software vulnerability - and what you can do about it.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Incident Readiness and Response Playbook

    The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the ...

  • Building Threat Intelligence into Your Enterprise Security Strategy

    In recent years, many enterprises have discovered that they can improve their defenses by collecting data about broad trends in online attacks that may pertain to their own IT environments. This "threat intelligence" can make it easier for security teams ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.