Follow Dark Reading:
 April 17, 2019
LATEST SECURITY NEWS & COMMENTARY
Decoding a 'New' Elite Cyber Espionage Team
Stealthy and well-heeled hacking group went undetected for five years and wields a massive attack framework of some 80 different modules.
Security Audit Shows Gains, Though Privacy Lags
The 2018 Online Trust Audit shows that "encryption everywhere" is improving security, while fuzzy language is slowing privacy gains.
Threat Group Exploits Chrome Bug to Serve Malicious Ads to iOS Users
A new exploit developed by eGobbler is allowing it to distribute malvertisements-more than 500 million to date-at huge scale, Confiant says.
Meet Scranos: New Rootkit-Based Malware Gains Confidence
The cross-platform operation, first tested on victims in China, has begun to spread around the world.
Benefiting from Data Privacy Investments
GDPR-ready companies experience lower overall costs associated with data breaches, research finds.
IT Outsourcing Firm Wipro Investigates Data Breach
Employee accounts may have been compromised in a sophisticated phishing campaign.
MORE NEWS & COMMENTARY
HOT TOPICS
25% of Phishing Emails Sneak into Office 365: Report
Researchers analyzed 55.5 million emails and found one out of every 99 messages contains a phishing attack.

New 'HOPLIGHT' Malware Appears in Latest North Korean Attacks, Say DHS, FBI
The FBI and Department of Homeland Security release malware analysis report, indicators of compromise for nine different executable files.

The Single Cybersecurity Question Every CISO Should Ask
The answer can lead to a scalable enterprise security solution for 2019 and beyond.

MORE
EDITORS' CHOICE

8 'SOC-as-a-Service' Offerings
These new cloud services seek to help companies figure out what their traditional SIEM alerts mean, plus how they can prioritize responses and improve their security operations.
When Your Sandbox Fails
The sandbox is an important piece of the security stack, but an organization's entire strategy shouldn't rely on its ability to detect every threat. Here's why.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building an Incident Readiness & Response Playbook

    Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident readiness and response playbook.

  • Zero Trust in Practice

    Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. Find out how you can get started with Zero Trust today!

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • How Enterprises Are Attacking the Cybersecurity Problem

    Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations ...

  • The State of Cyber Security Incident Response

    Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.