Follow Dark Reading:
 April 09, 2021
LATEST SECURITY NEWS & COMMENTARY
Zoom Joins Microsoft Teams on List of Enterprise Tools Hacked at Pwn2Own
White-hat hacking event shows yet again why there's no such thing as foolproof security against modern attacks.
Handcuffs Over AI: Solving Security Challenges With Law Enforcement
We've tried everything else ... now it's time to make the prospect of getting caught -- and punished -- a real deterrent to cybercrime.
Fraudsters Use HTML Legos to Evade Detection in Phishing Attack
Criminals stitch pieces of HTML together and hide them in JavaScript files, researchers report.
600K Payment Card Records Leaked After Swarmshop Breach
A leaked database also contains the nicknames, hashed passwords, contact details, and activity history of Swarmshop admins, sellers, and buyers.
Name That Edge Toon: Rough Patch?
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS & COMMENTARY
HOT TOPICS
Top 5 Attack Techniques May Be Easier to Detect Than You Think
New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years.

Solving the Leadership Buy-In Impasse With Data
Justify your requirements with real numbers to get support for security investments.

Weakness in EDR Tools Lets Attackers Push Malware Past Them
A technique called hooking used by most endpoint detection and response products to monitor running processes can be abused, new research shows.

MORE
EDITORS' CHOICE

7 Tips to Secure the Enterprise Against Tax Scams
Tax season is yet another opportunity for fraudsters to target your company. Here's how to keep everyone in the organization on their toes.
5 Ways to Transform Your Phishing Defenses Right Now
By transforming how you approach phishing, you can break the phishing kill chain and meaningfully reduce your business risk.
LATEST FROM THE EDGE

How to Build a Resilient IoT Framework
For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.