Follow Dark Reading:
 March 16, 2021
LATEST SECURITY NEWS & COMMENTARY
Verkada Breach Demonstrates Danger of Overprivileged Users
In re-evaluating supply chains, companies should classify vendors with super admin privileges to devices or backdoors as a significant threat.
CISA Updates Microsoft Exchange Advisory to Include China Chopper
US officials warn organizations of China Chopper Web shells as new data sheds light on how the Exchange Server exploits have grown.
(Sponsored Article) Ignorance Is Not Bliss: Addressing Cloud Data Security
Securing cloud data is a difficult task on a massive scale. If you don't think you have issues, you probably just can't see them. These steps can help.
How to Choose the Right Cybersecurity Framework
Cybersecurity frameworks can help reduce your risk of supply chain attacks and increase your competitive advantage.
Buffalo Public Schools Cancel Classes Due to Ransomware
The FBI is investigating the March 12 attack that disrupted the school system's phased reopening this week.
Lookout Acquires SASE Cloud Provider CipherCloud
Deal signals a focus on the cloud for mobile security firm.
Name That Toon: Something Seems Afoul
Dark Reading's March cartoon caption contest is here, along with a few new feathered friends.
MORE NEWS & COMMENTARY
HOT TOPICS
Can a Programming Language Reduce Vulnerabilities?
Rust offers a safer programming language, but adoption is still a problem despite recent signs of increasing popularity.

Microsoft Reports 'DearCry' Ransomware Targeting Exchange Servers
Attackers have begun to deploy ransomware on Microsoft Exchange Servers compromised by the ProxyLogon exploits.

Quantum Computing and Code-Breaking

Prepare today for the quantum threats of tomorrow.

MORE
EDITORS' CHOICE

Microsoft Exchange Server Attacks: 9 Lessons for Defenders
Experts share their guidance for organizations running on-premise Exchange servers in the wake of rapidly spreading attacks.
Power Equipment: A New Cybersecurity Frontier
Power systems, HVAC systems, and other network-connected devices are exposing new vulnerabilities that must be secured.
LATEST FROM THE EDGE

DDoS's Evolution Doesn't Require a Security Evolution
They may have grown in sophistication, with more widespread consequences, yet today's distributed denial-of-service attacks can still be fought with conventional tools.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Understanding XDR - April 8 FREE Webinar

    In this webinar, experts discuss the benefits and limitations of EDR, and offer recommendations on how to extend these capabilities to other parts of the IT infrastructure in order to improve overall security.

  • Detecting & Mitigating Attacks on Remote Workers

    In this webinar, experts discuss some of the cyber attacks that have been made on work-from-home end users, as well as exploits against remote systems and devices.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.