Follow Dark Reading:
 February 16, 2021
LATEST SECURITY NEWS & COMMENTARY
Water Utility Hack Could Inspire More Intruders
If past cyberattacks are any indication, success begets imitation. In the wake of last week's hack of Florida water utility, other water utilities and users of remote desktop software would be wise to shore up defenses, experts say.
100+ Financial Services Firms Targeted in Ransom DDoS Attacks in 2020
Consumer banks, exchanges, payment firms, and card issuing companies around the globe were among those hit.
Malware Exploits Security Teams' Greatest Weakness: Poor Relationships With Employees
Users' distrust of corporate security teams is exposing businesses to unnecessary vulnerabilities.
You've Got Cloud Security All Wrong: Managing Identity in a Cloud World
In a hybrid and multicloud world, identity is the new perimeter and a critical attack surface for bad actors.

Name That Toon: Gather 'Round the Campfire

We didn't start the fire, but we're sure it'll spark some ideas for our February cartoon caption contest.


How to Submit a Column to Dark Reading
Have a new idea, a lesson learned, or a call to action for your fellow cybersecurity professionals? Here's how to submit your Commentary pieces to Dark Reading.
MORE NEWS & COMMENTARY
HOT TOPICS
Malicious Code Injected via Google Chrome Extension Highlights App Risks
An open source plug-in purportedly introduced tracking and malicious download code to infect nearly 2 million users, reports say.

Hidden Dangers of Microsoft 365's Power Automate and eDiscovery Tools
Attackers are using legitimate enterprise tools to execute attacks and carry out malicious actions. Security teams must take action now.

Ransomware Attackers Set Their Sights on SaaS
Ransomware has begun to target data-heavy SaaS applications, open source, and Web and application frameworks.

MORE
EDITORS' CHOICE

7 Things We Know So Far About the SolarWinds Attacks
Two months after the news first broke, many questions remain about the sophisticated cyber-espionage campaign.
Multivector Attacks Demand Security Controls at the Messaging Level
As a Google-identified attack reveals, security teams need to look beyond VPNs and network infrastructure to the channels where social engineering takes place.
LATEST FROM THE EDGE

Unemployment Fraud: As If Being Out of Work Wasn't Bad Enough
With the pandemic as a backdrop, cybercriminals have recognized an unprecedented opportunity to steer billions of dollars in unemployment claims into the own accounts.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 5 Steps to Solving Modern Scalability Problems

    Attend this webinar to learn how distributed data models can keep up with today's data columns and offer other benefits like resiliency, tunability, enhanced security and faster performance, how you can simplify microservices management and improve scalability, and why cloud-native ...

  • Shifting Security from Speedbump to Digital Accelerator

    When you attend this webinar, you will learn about three practices that can help your businesses balance security and agility, without compromise.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.