Follow Dark Reading:
 May 16, 2018
LATEST SECURITY NEWS & COMMENTARY
US Government Cybersecurity at a Crossroads
Trump reportedly kills cybersecurity coordinator position, while meantime many agencies continue to play catch-up in their defenses.
Kaspersky Lab to Move Some Core Operations to Switzerland
Most customer data storage and processing, software assembly, and threat detection updates will be based in Zurich.
Don't Roll the Dice When Prioritizing Vulnerability Fixes
CVSS scores alone are ineffective risk predictors - modeling for likelihood of exploitation also needs to be taken into account.
25% of Businesses Targeted with Cryptojacking in the Cloud
New public cloud security report detects a spike in cryptojacking, mismanaged cloud storage, account takeover, and major patches getting overlooked.
Feds Name Suspect in CIA 'Vault 7' Hacking Tool Leak
Ex-CIA employee in jail for unrelated charges at this time.
New DDoS Attack Method Leverages UPnP
A new DDoS attack leverages unprotected UPnP routers to make attacks harder to stop.
Rail Europe Notifies Riders of Three-Month Data Breach
Rail Europe North America alerts customers to a security incident in which hackers planted card-skimming malware on its website.
MORE NEWS & COMMENTARY
HOT TOPICS
Phishing Attack Bypasses Two-Factor Authentication
Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.

Phishing Threats Move to Mobile Devices
Mobile devices are emerging as a primary gateway for phishing attacks aimed at stealing data.

Ready or Not: Transport Layer Security 1.3 Is Coming
Better encryption could mean weaker security if you're not careful.

MORE
EDITORS' CHOICE

8 Ways Hackers Can Game Air Gap Protections
Isolating critical systems from connectivity isn't a guarantee they can't be hacked.
Taming the Chaos of Application Security: 'We Built an App for That'
Want to improve the state of secure software coding? Hide the complexity from developers.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Electroneum Cryptomining Targets Microsoft IIS 6.0 Vulnerability
New campaign shows that there are still systems exposed to the year-old CVE-2017-7269 vuln on an operating system that was declared end-of-life three years ago.

Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

4 Critical Applications and How to Protect Them
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting their vulnerabilities.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.