Follow Dark Reading:
 June 20, 2019
LATEST SECURITY NEWS & COMMENTARY
With GDPR's 'Right of Access,' Who Really Has Access?
How a security researcher learned organizations willingly hand over sensitive data with little to no identity verification.
Insecure Home IoT Devices a Clear and Present Danger to Corporate Security
Avast-sponsored study shows wide prevalence of IoT devices, many with weak credentials and other security vulnerabilities.
Serverless Computing from the Inside Out
The biggest 'serverless' risks don't stem from the technology itself. They occur when organizations respond to the adoption from the outside in.
How Hackers Emptied Church Coffers with a Simple Phishing Scam
Cyber thieves aren't bound by a code of ethics. They look for weak targets and high rewards, which is exactly what Saint Ambrose Catholic offered.
Cost per Cyberattack Jumps to $4.6M in 2019
From 2018 to 2019, the percentage of cyberattacks costing $10 million or more nearly doubled, hitting 13%.
Verizon Media, Uber, PayPal Top List of Companies Paying Bug Bounties
A new report from HackerOne lists the top five companies running bug-hunting programs on the ethical hacking platform.
Critical Firefox Vuln Used in Targeted Attacks
Mozilla has released patches for the bug reported by Coinbase.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Notable Security Acquisitions of 2019 (So Far)
In a year when security companies have been snapped up left and right, these deals stand out from the chaos.

DNS Firewalls Could Prevent Billions in Losses to Cybercrime
New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.

BlueKeep RDP Vulnerability a Ticking Time Bomb
One month after Microsoft disclosed the flaw, nearly 1 million systems remain unpatched, and Internet scans looking for vulnerable systems have begun increasing.

MORE
EDITORS' CHOICE

6 Security Tips That'll Keep the Summer Fun
Taking some time off this summer? Before you head out on vacation, make sure your devices and apps are also ready.
Can Your Patching Strategy Keep Up with the Demands of Open Source?
It's time to reassess your open source management policies and processes.
Come to Black Hat USA for the Latest Hardware Hacks
Cars. Vending machines. Hotel suites. Security experts will share the tools and techniques they've used to break into all these things and more at Black Hat USA in October.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.