Follow Dark Reading:
 October 09, 2020
LATEST SECURITY NEWS & COMMENTARY
Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce
Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.
US Election-Related Websites Vulnerable to Fraud, Abuse
New research finds the vast majority of reputable news, political, and donor-oriented sites don't use registry locks.
Kaspersky Researchers Spot Russia-on-Russia Cyber-Espionage Campaign
Steganography-borne malware used to spy on industrial targets in Russia.
Scale Up Threat Hunting to Skill Up Analysts
Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.
Key Considerations & Best Practices for Establishing a Secure Remote Workforce
Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.
US Seizes Domain Names Used in Iranian Disinformation Campaign
The US has seized 92 domain names used by Iran's Islamic Revolutionary Guard Corps to spread a worldwide disinformation campaign.
MORE NEWS & COMMENTARY
HOT TOPICS
Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats
Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.

New Research Finds Bugs in Every Anti-Malware Product Tested
Products from every vendor had issues that allowed attackers to elevate privileges on a system -- if they already were on it.

A Guide to the NIST Cybersecurity Framework

With cybersecurity threats growing exponentially, it has never been more important to put together an efficient cyber-risk management policy, and NIST's framework can help.

MORE
EDITORS' CHOICE

6 Best Practices for Using Open Source Software Safely
Open source software is critical yet potentially dangerous. Here are ways to minimize the risk.
3 Ways Data Breaches Accelerate the Fraud Supply Chain
The battle's just beginning as bad actors glean more personal information from victims and use that data to launch larger attacks.
NEW FROM THE EDGE

Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective
In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.
Open Source Threat Intelligence Searches for Sustainable Communities
As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.