Follow Dark Reading:
 August 31, 2018
LATEST SECURITY NEWS & COMMENTARY
Who's At Greatest Risk for BEC Attacks? Not the CEO
CEOs only make up 2.2% of business email compromise targets, a sign most victims are further down the corporate ladder.
Carbanak/Cobalt/FIN7 Group Targets Russian, Romanian Banks in New Attacks
Latest campaign by the hard-to-kill cybercrime group hides malicious code behind legitimate files, Windows processes.
Cryptocurrency Scams Replacing Ransomware as Attackers' Fave
Cryptojacking miners and fileless malware see biggest growth in first half of 2018.
4 Benefits of a World with Less Privacy
The privacy issue is a problem for a lot of people. I see it differently.
Botnets Serving Up More Multipurpose Malware
Attackers increasingly are distributing malware that can be used for a variety of different tasks, Kaspersky Lab says.
New Pen Test Tool Tricks Targets with Microsoft WCX Files
The open-source tool lets penetration testers gather credentials by convincing targets to open a Microsoft WCX file.
'Celebgate' Hacker Heading to Prison
Connecticut man gets eight months for role in attack involving leak of personal celebrity photos, including those of actress Jennifer Lawrence.
MORE NEWS & COMMENTARY
HOT TOPICS
The Difference Between Sandboxing, Honeypots & Security Deception
A deep dive into the unique requirements and ideal use cases of three important prevention and analysis technologies.

Fileless Attacks Jump 94% in First Half of 2018
While ransomware is still popular, fileless and PowerShell attacks are the threats to watch this year.

Iranian Hackers Target Universities in Global Cyberattack Campaign
Cobalt Dickens threat group is suspected to be behind a large-scale cyberattack wave targeting credentials to access academic resources.

MORE
EDITORS' CHOICE

7 Steps to Start Searching with Shodan
The right know-how can turn the search engine for Internet-connected devices into a powerful tool for security professionals.
Lessons From the Black Hat USA NOC
The conference's temporary network operations center provides a snapshot of what is possible when a variety of professionals work together.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.