Follow Dark Reading:
 December 20, 2017
LATEST SECURITY NEWS & COMMENTARY
Trump Adviser: North Korea Waged WannaCry Attack
White House declares the North Korean government as perpetrators of the epic ransomware attack that spread around the globe in early May.
Microsoft Office Docs New Vessel for Loki Malware
Loki malware, built to steal credentials, is distributed via Microsoft Excel and other Office applications rigged with malicious 'scriptlets' to evade detection.
Another Cyberattack Spotted Targeting Mideast Critical Infrastructure Organizations
Operation Copperfield appears focused on data theft and reconnaissance, Nyotron says.
New Database Botnet Leveraged for Bitcoin Mining
Attackers are quietly building an attack infrastructure using very sensitive machines.
Comprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence
CTI falls into three main categories -- tactical, operational, and strategic -- and answers questions related to the "who, what, and why" of a cyber attack.
Massive Cloud Leak Exposes Alteryx, Experian, US Census Bureau Data
A misconfigured Amazon Web Services S3 storage bucket exposed sensitive data on consumers' financial histories, contact information, and mortgage ownership.
MORE NEWS & COMMENTARY
HOT TOPICS
Advanced Deception: How It Works & Why Attackers Hate It
While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats.

Malware Decompiler Tool Goes Open Source
Avast's RetDec machine-code decompiler now available for free on Github.

8 Steps for Building an IT Security Career Path Program
A cybersecurity career-path program can help with talent retention and recruitment.

MORE
EDITORS' CHOICE

Top 8 Cybersecurity Skills IT Pros Need in 2018
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Analytics for Omnichannel Success

    Why are some retailers outperforming the competition? What secrets do the top Omnichannel retailers share? Join AllAnalytics Radio as we welcome retail experts Brian Kilcourse and Paula Rosenblum to share the results of their research on how some retailers are ...

  • Ransomware: Trends, Use Cases & Protection

    Ransomware is one of the favorite flavors of malware and is particularly vicious and showing no signs of slowing down. Join this webinar as Senior Security Researcher Kyle Wilhoit helps us to understand ransomware trends, ransomware use cases, the financial ...

MORE WEBINARS

Partner Perspectives

Is a Good Offense the Best Defense Against Hackers?
A proposed new law could make it legal for companies to hack back against attacker. But will it work?

Why Third-Party Security Is your Security
Managing third-party risk isn't just a good idea, in many cases, it's the law. This security framework can help you minimize the threat.

The Good News about Breaches: It Wasn't You this Time
Somewhere in every application there is a vulnerability waiting to be exploited. You can attack the problem by having the right mindset and answering two simple questions

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.