Follow Dark Reading:
 July 22, 2021
LATEST SECURITY NEWS & COMMENTARY
US Accuses China of Using Criminal Hackers in Cyber Espionage Operations
DOJ indicts four Chinese individuals for alleged role in attacks targeting intellectual property, trade secrets belonging to defense contractors, maritime companies, aircraft service firms, and others.
7 Hot Cyber Threat Trends to Expect at Black Hat
A sneak-peak of some of the main themes at Black Hat USA next month.
Cybercriminals Rewrite Malware to Target MacOS
Researchers discover a widespread, inexpensive malware variant has been redesigned to target both macOS and Windows devices.
TSA Issues Second Directive for Pipeline Operators Amid China Concerns
A separate advisory from the CISA this week resurfaced details of a 2011–2013 Chinese campaign against energy industry targets and warned that same tactics and techniques still remain effective.
Recent Attacks Lead to Renewed Calls for Banning Ransom Payments
While attackers in protected jurisdictions continue to get massive sums for continuing to breach organizations, the ransomware threat will only continue to grow.
State Dept. to Pay Up to $10M for Information on Foreign Cyberattacks
The Rewards for Justice program, a counterterrorism tool, is now aimed at collecting information on nation-states that use hackers to disrupt critical infrastructure.
Recent Attacks Lead to Renewed Calls for Banning Ransom Payments
While attackers in protected jurisdictions continue to get massive sums for continuing to breach organizations, the ransomware threat will only continue to grow.
Nearly All Linux OSes Have a Pair of Privilege Escalation Flaws
The issues, affecting kernels dating back to August 2014, allow an unprivileged user to gain root access to the operating system.
Why the FBI's Recovery of Colonial Pipeline Ransom Signals Hope for the Future
The "win for the good guys" is a monumental step toward breaking down the business model of ransomware and digital extortion.
Big Game Makes Easy Prey for Cybercriminals
By adopting nation-state methods, cybercriminals have moved on from small prey to large targets to rake in millions of dollars with relatively little effort.
7 Ways AI and ML Are Helping and Hurting Cybersecurity
In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they can create significant harm.
Law Firm for Ford, Pfizer, Exxon Discloses Ransomware Attack
Campbell Conroy & O'Neil reports the attack affected personal data including Social Security numbers, passport numbers, and payment card data for some individuals.
CISA Launches New Website to Aid Ransomware Defenders
StopRansomware.gov provides information to help organizations protect against, and respond to, ransomware attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
Breaking Down the Threat of Going All-In With Microsoft Security
Limit risk by dividing responsibility for infrastructure, tools, and security.

Google Cloud Debuts Security Tools for Public & Private Sectors
Today's announcements include a cloud-native intrusion detection system and government-focused offerings that comply with the White House's executive order.

Researchers Create New Approach to Detect Brand Impersonation
A team of Microsoft researchers developed and trained a Siamese Neural Network to detect brand impersonation attacks.

MORE
EDITORS' CHOICE

7 Hot Cyber Threat Trends to Expect at Black Hat
A sneak peek of some of the main themes at Black Hat USA next month.
Top Security Leaders Share Management Tips, Lessons, and Stories
A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing through crises, and how they wish people communicated with them.
LATEST FROM THE EDGE

How Gaming Attack Data Aids Defenders Across Industries
Web application attacks against the video game industry quadrupled in 2020 compared to the previous year, but companies outside entertainment can learn from the data.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise

    Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ...

  • Unifying Your Enterprise's Endpoint Security Strategy

    For enterprises that support many users and endpoints, building and maintaining a consistent security strategy was a major challenge even before 2020. Since the onset of the global pandemic, however, it has become more difficult than ever to build and maintain ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.