Follow Dark Reading:
 July 16, 2020
LATEST SECURITY NEWS & COMMENTARY
Vulns in Open Source EHR Puts Patient Health Data at Risk
Five high-risk flaws in health IT software from LibreHealth, a researcher at Bishop Fox finds.
Puzzles and Riddles Help InfoSec Pros Solve Real-World Problems
A researcher shares the unexpected lessons learned in years of creating puzzles and riddles for his cybersecurity colleagues.
How Nanotechnology Will Disrupt Cybersecurity
Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.
Top 5 Questions (and Answers) About GRC Technology
For the first time in a long time, we must shift from managing localized risks against a landscape of economic growth to managing those issues under much less certain circumstances.
Cryptocurrency Scam Spreads Across High-Profile Twitter Accounts
Twitter accounts belonging to former president Barack Obama, Joe Biden, Jeff Bezos, Elon Musk, and Bill Gates are among those hijacked in a massive cryptocurrency scam.
New Attack Technique Uses Misconfigured Docker API
A new technique builds and deploys an attack on the victim's own system
'Patch ASAP': Cisco Issues Updates for Routers, VPN Firewall
Cisco issues five critical security patches among a batch of some 31 updates.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Patches Wormable RCE Flaw in Windows DNS Servers
Patch Tuesday security updates address a critical vulnerability in Windows DNS Servers, which researchers believe is likely to be exploited.

99% of Websites at Risk of Attack Via JavaScript Plug-ins
The average website includes content from 32 different third-party JavaScript programs, new study finds.

As Offices Reopen, Hardware from Home Threatens Security
Devices out of sight for the past several months could spell trouble when employees bring them back to work.

MORE
EDITORS' CHOICE

6 Tips for Getting the Most from Nessus
Books have been written on using the powerful network-discovery and vulnerability-scanning tool. These tips will help you get started.

How Enterprises Are Developing and Maintaining Secure Applications

In this 2020 Dark Reading report, we examine the most common issues associated with managing an application portfolio and how organizations are dealing with security risks.


NEW FROM THE EDGE

Name That Toon: Tough Times, Tough Measures
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Don't Miss this Event Featuring Rob Carter - CIO of FedEx

    In these tumultuous times, IT organizations are tasked with two critical, yet often conflicting priorities: increasing online innovation and cutting IT costs. In this eye-opening keynote address you'll get a first-hand perspective on how organizations can implement new IT strategies ...

  • Security Alert Fatigue: Tips for Taking Control

    Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.