Follow Dark Reading:
 August 04, 2021
LATEST SECURITY NEWS & COMMENTARY
Average Cost to Buy Access to a Compromised Company: $1,000
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to specialize in particular stages of the attack-chain pipeline.
New Raccoon Stealer Campaign Underscores an Evolving Threat
An information stealer disguised as pirated software targets cryptocurrencies and data while dropping malicious content on infected devices.
Think Having Avoided Kaseya Means You're Safe? Guess Again
The lesson: Don't assume that everything coming from an apparently benign source is safe.
5 Questions Your Organization Must Ask to Prepare for a Ransomware Attack
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomware wave.
Get Ahead of the Hack: Why Cyber Insurance Is Not Enough
Cybersecurity insurance is a smart investment to protect against the effects of ransomware and other attacks, but it shouldn't be your primary defense.
Human Security Launches Dan Kaminsky Fellowship
The fellowship, created in honor of Human's co-founder and chief scientist Dan Kaminsky, will be awarded to someone "who epitomized benevolent internet innovation."
Name That Edge Toon: Good Heavens!
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Hot Cyber Threat Trends to Expect at Black Hat
A sneak peek of some of the main themes at Black Hat USA next month.

Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a new hybrid twist.

Why Your People Are the Best Untapped Security Strategy
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among employees.

MORE
EDITORS' CHOICE

Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new research shows.
Build a Continuous Education Program for Better Cybersecurity
Addictive learning works because it keeps students interested and challenged at all times.
LATEST FROM THE EDGE

5 Key Questions When Evaluating Software Supply Chain Security
Knowing what to ask a potential supplier can minimize risks associated with third-party software vulnerabilities and breaches.
Tech Resources
ACCESS TECH LIBRARY NOW

  • External Threat Hunting - Reduce Supply Chain Risk

    In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ...

  • Two Sides of the PAM Coin

    There are two sides of the PAM (Privileged Access Management) Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches, but don't stop there! We ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.