Follow Dark Reading:
 January 31, 2020
LATEST SECURITY NEWS & COMMENTARY
Two Vulnerabilities Found in Microsoft Azure Infrastructure
Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.
Enterprise Hardware Still Vulnerable to Memory Lane Attacks
Most laptops, workstations, and servers are still vulnerable to physical attacks via direct memory access, despite mitigations often being available, report says.
Android Malware for Mobile Ad Fraud Spiked Sharply in 2019
Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says.
How to Secure Your IoT Ecosystem in the Age of 5G
For businesses planning to adopt 5G, the sheer number of IoT devices creates a much larger attack surface.
Russian Cybercrime Forum Contests Bring Cash, Visibility to Winners
Competitions for users are a long-time tradition on underground cybercrime forums for members looking for money - and cred with major criminal syndicates.
United Nations Data Breach Started with Microsoft SharePoint Bug
A remote code execution flaw enabled a breach of UN offices in Geneva and Vienna, as well as the Office of the High Commissioner for Human Rights.
How To Keep Your Privacy and Data Secure While Working With a Remote Team
Implementing basic strategies can ensure your remote team's work will be secure, data will be protected, and you'll be far less exposed to security risks.
MORE NEWS & COMMENTARY
HOT TOPICS
Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says
Attackers 'weaponized' Active Directory to spread the ransomware.

7 Steps to IoT Security in 2020
There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.

5 Resume Basics for a Budding Cybersecurity Career
You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.

MORE
EDITORS' CHOICE

9 Things Application Security Champions Need to Succeed
Common elements to highly effective security champion programs that take DevSecOps to the next level.
Election Security 2020: How We Should Allocate $425M in Funding
Too many states and municipalities still rely on aging systems; it's time they upped their game and treated election technology like they would any other security project.
NEW FROM THE EDGE: ASK THE EXPERTS

I'm an SMB. What Should I Watch for When Choosing Security Vendors?
SMBs need action, not just insight.
How Do I Get My Team Started with Container Security and Kubernetes?
The trick is to give your technical staff enough time to learn the new technology but also keep the pressure on to deliver. Here's a smart way to begin.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.