Follow Dark Reading:
 March 20, 2019
LATEST SECURITY NEWS & COMMENTARY
DDoS Attack Size Drops 85% in Q4 2018
The sharp decline follows an FBI takedown of so-called "booter," or DDoS-for-hire, websites in December 2018.
Microsoft Office Dominates Most Exploited List
Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.
Stealing Corporate Funds Still Top Goal of Messaging Attacks
Cybercriminals focus on collecting credentials, blackmailing users with fake sextortion scams, and convincing privileged employees to transfer cash. The latter still causes the most damage, and some signs suggest it is moving to mobile.
The Case of the Missing Data
The latest twist in the Equifax breach has serious implications for organizations.
Crowdsourced vs. Traditional Pen Testing
A side-by-side comparison of key test features and when best to apply them based on the constraints within your budget and environment.
New Mirai Version Targets Business IoT Devices
The notorious Internet of Things botnet is evolving to attack more types of devices - including those found in enterprises.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Low-Cost Security Tools
Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.

Citrix Breach Underscores Password Perils
Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.

Norsk Hydro Shuts Plants Amid Ransomware Attack
The cyberattack, first detected on Monday night, has shut down Norsk's entire global network.

MORE
EDITORS' CHOICE

6 Ways Mature DevOps Teams Are Killing It in Security
New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.
Are You Prepared for a Zombie (Domain) Apocalypse?
When a domain registration expires, they can be claimed by new owners. And sometimes, those new owners have malicious intent.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Understanding and Preventing Social Engineering Attacks

    How can enterprises prevent "social engineering" attacks? Can users be trained to recognize such exploits and avoid them? Join Dark Reading as we invite top experts to discuss the most effective methods of defending against social engineering attacks.

  • Practical Cyber Defense for ICS

    In this Dark Reading webinar, top experts offer insight on the threat posed to Industrial control systems (ICS) systems, and how you can expand your security strategies to protect them.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.