Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.
| LATEST SECURITY NEWS & COMMENTARY | Researchers Discover Dangerous Firmware-Level Rootkit MoonBounce is the latest in a small but growing number of implants found hidden in a computer's Unified Extensible Firmware Interface (UEFI). Millions of Routers, IoT Devices at Risk as Malware Source Code Surfaces on GitHub "BotenaGo" contains exploits for more than 30 vulnerabilities in multiple vendor products and is being used to spread Mirai botnet malware, security vendor says. Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit. REvil Ransomware Gang Arrests Trigger Uncertainty, Concern in Cybercrime Forums Threat actors from Eastern Europe seen expressing some concern about Russia being a safe place for them to continue operating, researchers say. Trickbot Injections Get Harder to Detect & Analyze The authors of the infamous malware family have added measures for better protecting malicious code injections against inspection and research. Threat Actors Use Microsoft OneDrive for Command-and-Control in Attack Campaign Signs hint at Russia's APT28, aka Fancy Bear, being behind the attacks, according to new research. Cybersecurity Is Broken: How We Got Here & How to Start Fixing It It's not just your imagination — malicious threats have exponentially increased organizational risk. Striking a Balance Between Cybersecurity Awareness and Anxiety Employees don't have to be paralyzed by fear to keep the company safe. They just have to understand what threats look like and how to stop them. Enterprises Are Sailing Into a Perfect Storm of Cloud Risk Policy as code and other techniques can help enterprises steer clear of the dangers that have befallen otherwise sophisticated cloud customers. Are You Prepared to Defend Against a USB Attack? Recent "BadUSB" attacks serve as a reminder of the big damage that small devices can cause. Cyber-Physical Security: What It Is and What You Should Do Ancillary installations like the Internet of Things, operational technology, and industrial control systems enable lots of great functionality, and they face most of the same risks as IT infrastructure. MORE NEWS / MORE COMMENTARY | | |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech 303 Second St., Suite 900 South Tower, San Francisco, CA 94107 | To update your profile, change your e-mail address, or unsubscribe, click here. | To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|