Follow Dark Reading:
 March 22, 2018
LATEST SECURITY NEWS & COMMENTARY
AMD Processor Flaws Real, But Limited
A vulnerability report threatened falling skies over AMD processor vulnerabilities that are real but limited in impact.
Azure Guest Agent Design Enables Plaintext Password Theft
Researchers find attackers can abuse the design of Microsoft Azure Guest Agent to recover plaintext administrator passwords.
Supply Chain Cyberattacks Surged 200% in 2017
Symantec's annual Internet Security Threat Report also shows that zero-day exploits fizzled and cryptocurrency mining exploded.
How Serverless Computing Reshapes Security
The new division of responsibility moves some security concerns off a business's plate while changing priorities for other risks.
SOC in Translation: 4 Common Phrases & Why They Raise Flags
By keeping an ear out for out for catchphrases like "Just ask Stu" or "I've got a bad feeling about this," CISOs can overcome the barriers that get between business leaders and their security teams.
Trump Administration Slaps Sanctions on Russian Hackers, Operatives
A two-pronged and mostly symbolic strategy names and shames Russia for US election-tampering and hacking of critical infrastructure.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Spectre/Meltdown Symptoms That Might Be Under Your Radar
The Spectre/Meltdown pair has a set of major effects on computing but there are impacts on the organization that IT leaders might not have considered in the face of the immediate problem.

Russian APT Compromised Cisco Router in Energy Sector Attacks
DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.

Microsoft Report: Cybersecurity's Top 3 Threats Intertwine
Botnets, ransomware, and simple attack methods dominate the threat landscape and build on each other to drive effectiveness.

MORE
EDITORS' CHOICE

Who Does What in Cybersecurity at the C-Level
As security evolve as a corporate priority, so do the roles and responsibilities of the executive team. These seven titles are already feeling the impact.
Critical Infrastructure: Stop Whistling Past the Cyber Graveyard
An open letter to former colleagues in Homeland Security, peers in private sector cybersecurity firms, those who own and operate critical systems, academics, and politicians.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.