| LATEST SECURITY NEWS & COMMENTARY | Attackers' Use of Uncommon Programming Languages Continues to Grow Attackers use uncommon languages — such as Go, D, Nim, and Rust — to evade detection or make their development process more efficient. Kaseya Offers Customers Decryption Key for Massive Ransomware Attack The remote management software company will not disclose the source of the decryption key, but at least one company has confirmed that it works. Data Breach Cost Hits Record High of $4.24M The per-breach cost represents a 10% increase from the average cost per incident recorded one year prior, IBM reports. Praying Mantis Threat Group Targeting US Firms in Sophisticated Attacks Group's advanced memory-resident attacks similar to those employed in sustained campaign against Australian companies and government last year, security vendor says. What Does It Take to Secure Containers? A vast majority of DevOps practitioners say containerization technology provides security, but some companies — especially security firms — disagree. CISA, FBI Name the Most Exploited Vulnerabilities Over the Past Year List shows many relatively new and perimeter-like devices targeted in 2020 and 2021, according to an analysis by CISA, the FBI, the Australian Cyber Security Centre, and the United Kingdom’s National Cyber Security Centre. Memory Corruption Issues Lead 2021 CWE Top 25 The MITRE Common Weakness Enumeration (CWE) team's latest list of most dangerous software flaws includes several that shot up in significance since 2020. Understanding and Mitigating Insider Threats in Today's Remote-Work World The insider threat menace has grown during the pandemic, worsened by an increase in credential theft and broader use of shadow IT. Managing Increased Cyber-Physical Security Threats in a Hyper-Connected World Physical security and cybersecurity can't be managed separately. IoT Search Engines Make It Easy to Find Vulnerable Devices, and That's a Problem Here are five tips to protect your company. White House Issues Memo on US Critical Infrastructure Security The memo describes critical infrastructure threats as one of the most significant issues confronting the nation. Malware Infects Japanese Devices Ahead of Olympic Games A Japanese security company reports the wiper malware searches for specific file types in a target's personal Windows folder. MORE NEWS & COMMENTARY | | |
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech 303 Second St., Suite 900 South Tower, San Francisco, CA 94107 | To update your profile, change your e-mail address, or unsubscribe, click here. | To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|