Follow Dark Reading:
 May 14, 2019
LATEST SECURITY NEWS & COMMENTARY
78% of Consumers Say Online Companies Must Protect Their Info
Yet 68% agree they also must do more to protect their own information.
Korean APT Adds Rare Bluetooth Device-Harvester Tool
ScarCruft has evolved into a skilled and resourceful threat group, new research shows.
How Open Testing Standards Can Improve Security
When creating security metrics, it's critical that test methodologies cover multiple scenarios to ensure that devices perform as expected in all environments.
LockerGoga, MegaCortex Ransomware Share Unlikely Traits
New form of ransomware MegaCortex shares commonalities with LockerGoga, enterprise malware recently seen in major cyberattacks.
Attacks on JavaScript Services Leak Info From Websites
Three marketing tools, including the Best Of The Web security logomark, were compromised in supply chain attacks, allegedly leaving website customers leaking their users' sensitive information.
Thrangrycat Claws Cisco Customer Security
A linked pair of vulnerabilities could allow an attacker to take over many different types of Cisco networking components.
Poorly Configured Server Exposes Most Panama Citizens' Data
Compromised information includes full names, birth dates, national ID numbers, medical insurance numbers, and other personal data.
MORE NEWS & COMMENTARY
HOT TOPICS
Demystifying the Dark Web: What You Need to Know
The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.

How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.

Social Engineering Slams the C-Suite: Verizon DBIR
Criminals are also going after cloud-based email accounts, according to Verizon's '2019 Data Breach Investigations Report.'

MORE
EDITORS' CHOICE

The 2019 State of Cloud Security
Enterprise cloud security is making real progress, but emerging technologies call for security teams to keep up the pace.
How to Close the Critical Cybersecurity Talent Gap
If we don't change our ways, the gap will keep getting worse. Outside-the-box thinking and new techniques are required, and here are a few ways to get started.
Tech Resources

Partner Perspectives

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.