Follow Dark Reading:
 June 04, 2021
LATEST SECURITY NEWS & COMMENTARY
Google Experts Explore Open Source Security Challenges & Fixes
An open source security event brought discussions of supply chain security and managing flaws in open source projects.
Proposed Sale Casts Cloud Over Future of FireEye's Products
Symphony Technology Group, which is buying FireEye, already owns multiple security companies "with redundancies in numerous areas."
The True Cost of a Ransomware Attack
Companies need to prepare for the costs of an attack now, before they get attacked. Here's a checklist to help.
The Colonial Pipeline Attack Is Your Boardroom Wake-Up Call
Why business leaders must adopt a risk-led approach to cybersecurity.
NY & Mass. Transportation Providers Targeted in Recent Attacks
New York's Metropolitan Transportation Authority and the Steamship Authority of Massachusetts were both victims of cyberattacks.
REvil Behind JBS Ransomware Attack: FBI
Officials attribute the attack to REvil/Sodinokibi and say they are working to bring the threat actors to justice.
MORE NEWS & COMMENTARY
HOT TOPICS
A Wrench and a Screwdriver: Critical Infrastructure's Last, Best Lines of Defense?
Critical infrastructure's cybersecurity problems are complex, deep-rooted, and daunting. Addressing them won't be easy...but it isn't impossible.

Processor Morphs Its Architecture to Make Hacking Really Hard
Researchers create a processor that uses encryption to modify its memory architecture during runtime, making it very difficult for hackers to exploit memory-based vulnerabilities.

Chaos for the Sake of Chaos? Yes, Nation-States Are That Cynical
Many nation-state-backed attacks are intended to destabilize the US government, not steal from it.

MORE
EDITORS' CHOICE

A View From Inside a Deception
Pen-testing today's threat deception technology is not for the faint-hearted. Do modern deception tools truly frustrate adversaries, and are they ready for the enterprise SOC?
Is Your Adversary James Bond or Mr. Bean?
Especially with nation-state attacks, its critical to assess whether you're up against jet fighter strength or a bumbler who tries to pick locks.
LATEST FROM THE EDGE

Microsoft 365: Most Common Threat Vectors & Defensive Tips
Security pros discuss the most typical ways attackers leverage Microsoft 365 and share their guidance for defenders.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.