Follow Dark Reading:
 April 24, 2020
LATEST SECURITY NEWS & COMMENTARY
White-Hat Hackers Help 'Fold' COVID-19 Proteins
A grassroots effort provides scientists with computing power to help simulate the novel coronavirus' proteins and come up with therapeutic solutions for the disease.
Demand for Cybersecurity Jobs Declines But Still Outperforms Other Sectors
While companies are cutting back on plans to hire, cybersecurity and the technology industry as a whole are doing better than the general economy.
Why Consumers, SMBs Are Likely to Fall for Coronavirus Scams
Data reveals both a lack of skepticism and a willingness to engage with emails crafted to seem like government communications.
How the Dark Web Fuels Insider Threats
New decentralized, criminal marketplaces and "as-a-service" offerings make it easy for employees to monetize their knowledge and access to enterprise networks and systems.
The Evolving Threat of Credential Stuffing
Bots' swerve to focus on APIs means businesses must take the threat seriously and take effective action.
Paay Misconfiguration Leaves Transaction Data Exposed
The New York-based credit-card processor left a server without password protection for approximately three weeks.
Communication, Cloud & Finance Apps Most Vulnerable to Insider Threat
Businesses say customer data, financial data, and intellectual property are the types of data most vulnerable to insider attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
Automated Bots Are Increasingly Scraping Data & Attempting Logins
The share of bot traffic to online sites declines, but businesses are seeing an overall increase in automated scraping of data, login attempts, and other detrimental activity.

Researchers Use Microsoft Terminal Services Client in New Attack Method
The technique would enable attackers to run malicious code via Remote Desktop Protocol using DLL side-loading to bypass security controls.

Apple iOS Zero-Day Vulnerabilities Exploited in Targeted Attacks
One of the flaws is remotely exploitable with no user interaction needed, ZecOps says.

MORE
EDITORS' CHOICE

10 Standout Security M&A Deals from Q1 2020
The first quarter of 2020 brought investments in enterprise IoT and endpoint security, as well as billion-dollar investments from private equity firms.
Resiliency: The Trait National Sporting Leagues Share with Security & IT Teams
During unprecedented times such as these, both businesses and professional sports are forced to go back to basics.
NEW FROM THE EDGE

5 Ways to Prove Security's Worth in the Age of COVID-19
Tightened budgets are placing jobs at risk, but security pros say they're armed with ways to demonstrate that what they're doing merits keeping them employed.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Red Team Realities: Testing that goes beyond compliance

    Using real-world anecdotes, this webinar will illustrate how to navigate a decision-making process aligned to use cases and desired outcomes tailored to your organization's needs. Listen as we discuss the different levels of cybersecurity assessments, and help you determine which ...

  • Building and Managing an Effective Mobile Security Strategy

    In this webinar, attendees will get advice on how to build a sound, effective mobile security strategy that works across locations and devices --and that can be enforced across the enterprise.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.