Follow Dark Reading:
 July 30, 2021
LATEST SECURITY NEWS & COMMENTARY
US Government Unlikely to Ban Ransomware Payments
The Department of Justice believes that banning ransom payments will cause greater havoc. However, the agency has called for incident reporting to be required.
Chinese-Speaking Threat Actor Using Unknown Rootkit in Targeted Attacks
Security vendor says it first spotted 'GhostEmperor' when investigating attacks targeting Microsoft Exchange flaws.
Corporate Mismanagement Contributing to Cybersecurity Hiring Challenges
Lack of competitive compensation and unrealistic requirements are impeding the ability to acquire qualified cybersecurity staff, a new survey shows.
How Adversaries Still Target Microsoft Active Directory 20 Years Later
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
Why Your People Are the Best Untapped Security Strategy
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among employees.
Phishing, Viruses Continue to Dominate the Malware Landscape
Despite concerns over widely publicized ransomware and supply chain attacks, most enterprises report that phishing attacks and viruses are the most common threats they face.
Babuk Coding Errors Make Data Recovery 'Impossible'
The ransomware group's decryption tool is poorly designed and coded, leading the group to focus more on data theft rather than encryption, researchers report.
Lower-Level Employees Become Top Spear-Phishing Targets
Cybercriminals seek employees who will be a "weak link" in the organization when designing phishing attacks, a new report finds.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Security Tools to be Unveiled at Black Hat USA
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.

Managing Increased Cyber-Physical Security Threats in a Hyper-Connected World
Physical security and cybersecurity can't be managed separately.

Top Security Leaders Share Management Tips, Lessons, and Stories
A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing through crises, and how they wish people communicated with them.

MORE
EDITORS' CHOICE

Data Breach Cost Hits Record High of $4.24M
The per-breach cost represents a 10% increase from the average cost per incident recorded one year prior, IBM reports.
How We Can Start Winning the Cyber War
Government and industry must work hand-in-hand to execute a winning game plan against cyber terrorists.
LATEST FROM THE EDGE

101: Why BGP Hijacking Just Won't Die
A look at the dangers of attacks on the Internet's Border Gateway Protocol and what ISPs and enterprises can do about them.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Unifying Your Endpoint Security Strategy

    For enterprises that support many users and endpoints, building and maintaining a consistent security strategy was a major challenge even before 2020. Since the onset of the global pandemic, however, it has become more difficult than ever to build and maintain ...

  • Two Sides of the PAM Coin

    There are two sides of the PAM (Privileged Access Management) Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches, but don't stop there! We ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.