Follow Dark Reading:
 May 04, 2017
LATEST SECURITY NEWS & COMMENTARY
Verizon DBIR Shows Attack Patterns Vary Widely By Industry
It's not always the newest or the most sophisticated threat you need to worry about, Verizon's breach and security incident data for 2016 shows.
Google Docs Phishing Attack Abuses Legitimate Third-Party Sharing
Phishing messages appear nearly identical to legitimate requests to share Google documents, because in many ways, they are.
Netflix Incident A Sign Of Increase In Cyber Extortion Campaigns
Attackers using threats of data exposure and DDoS disruptions to try and extort ransoms from organizations
Ransomware Payout Doesn't Pay Off
About 40% of small- and midsized businesses hit with ransomware paid their attackers, but less than half got their information back.
A Day in the Life of a Security Avenger
Behind the scenes with a security researcher as we follow her through a typical day defending the world against seemingly boundless cyberthreats and attacks
MORE NEWS & COMMENTARY
HOT TOPICS
10 Cybercrime Myths that Could Cost You Millions
Don't let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.

Fileless Malware Attacks Continue to Gain Steam
Endpoint woes grow as fileless attacks grow in prevalence and file-based attacks remain largely undetected by AV engines.

New Free Shodan Tool Roots Out RATs
Shodan teams up with Recorded Future to crawl the Net for computers serving as command-and-control (C2) for remote access Trojans (RATs).

MORE
OWASP 10 FACE OFF: ENG V WILLIAMS

OWASP Top 10 Update: Is It Helping to Create More Secure Applications?
What has not been updated in the new Top 10 list is almost more significant than what has.
New OWASP Top 10 Reveals Critical Weakness in Application Defenses
It's time to move from a dependence on the flawed process of vulnerability identification and remediation to a two-pronged approach that also protects organizations from attacks.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Data Tells: Dissecting Every Day Data

    Join us as the author of the book "Everydata: The Misinformation Hidden in the Little Data You Consume Every Day" examines common ways data is misrepresented or misinterpreted, the limitations of forecasts and predictions, and how to recognize "Tells" in ...

  • [Cybersecurity] New Methods for Managing the Skills Shortage

    In this webinar, security experts discuss methods for doing better security with fewer people, including: Time-saving tools for automating security functions, effective ways to use outsourcing and third-party services, creative places to look for new talent and the best ways ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.