Follow Dark Reading:
 May 05, 2021
LATEST SECURITY NEWS & COMMENTARY
Hundreds of Millions of Dell Computers Potentially Vulnerable to Attack
Hardware maker has issued an update to fix multiple critical privilege escalation vulnerabilities that have gone undetected since 2009.
Newer Generic Top-Level Domains a Security 'Nuisance'
Ten years of passive DNS data shows classic TLDs such as .com and .net dominate newer TLDs in popularity and use.
More Companies Adopting DevOps & Agile for Security
Measures of programming speed, security, and automation have all significantly increased in the past year, GitLab's latest survey finds.
Can Organizations Secure Remote Workers for the Long Haul?
By focusing on protection instead of detection, organizations can defend against targeted attacks without compromising security or productivity.
It's Time to Ditch Celebrity Cybersecurity
High-profile attacks and solutions are shiny objects that can distract from the defenses that afford the greatest protection.
Scripps Health Responds to Cyberattack
The health care system says it has suspended access to patient portals and other applications related to operations at Scripps facilities.
Apple Issues Patches for Webkit Security Flaws
The vulnerabilities may already be under active attack, Apple says in an advisory.
MORE NEWS & COMMENTARY
HOT TOPICS
Dark Reading Celebrates 15th Anniversary
Cybersecurity news site begins 16th year with plans to improve site, deliver more content on cyber threats and best practices.

Researchers Explore Active Directory Attack Vectors
Incident responders who investigate attacks targeting Active Directory discuss methods used to gain entry, elevate privileges, and control target systems.

4 Ways CISOs Can Strengthen Their Security Resilience
Security pros must remember bad actors will target their infrastructure, using counter-incident response technology in the process.

MORE
EDITORS' CHOICE

10 Free Security Tools at Black Hat Asia 2021
Researchers are set to demonstrate a plethora of tools for conducting pen tests, vulnerability assessments, data forensics, and a wide range of other use cases.
Stopping the Next SolarWinds Requires Doing Something Different
Will the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale?
LATEST FROM THE EDGE

Planning Our Passwordless Future
All the talk that passwords could one day go away seemed too good to be true, yet the scales are finally started to tip to a passwordless reality. (Part one of a two-part series.)
Tech Resources
ACCESS TECH LIBRARY NOW

  • Web Security: Protecting Your Data from Internet Threats

    One of the most accessible methods of cracking your corporate data is through a simple Internet connection. In this webinar, experts offer a look at some of the most common ways that cyber attackers use to crack enterprise systems via ...

  • Making XDR Work in Your Enterprise - Dark Reading

    In this Dark Reading webinar, experts discuss the real-life implementation issues surrounding emerging detection and response technologies. You'll learn how these emerging technologies can be integrated with your existing cybersecurity tools, and how XDR technology might affect your cybersecurity operations ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.