| LATEST SECURITY NEWS & COMMENTARY | 18,000 Organizations Possibly Compromised in Massive Supply-Chain Cyberattack Nation-state attackers used poisoned SolarWinds network management software updates to distribute malware; US government orders federal civilian agencies to immediately power down the technology. FireEye Identifies Killswitch for SolarWinds Malware as Victims Scramble to Respond White House National Security Council establishes unified group to coordinate response across federal agencies to the threat. Medical Imaging Leaks Highlight Unhealthy Security Practices More than 45 million unique images, such as X-rays and MRI scans, are accessible to anyone on the Internet, security firm says. Attackers Leverage IMAP to Infiltrate Email Accounts Researchers believe cybercriminals are using a tool dubbed Email Appender to directly connect with compromised email accounts via IMAP. VPNs, MFA & the Realities of Remote Work The work-from-home-era is accelerating cloud-native service adoption. Penetration Testing: A Road Map for Improving Outcomes As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities. Microsoft Warns of Powerful New Adware The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research. MORE NEWS & COMMENTARY | | |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech 303 Second St., Suite 900 South Tower, San Francisco, CA 94107 | To update your profile, change your e-mail address, or unsubscribe, click here. | To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|