Follow Dark Reading:
 March 13, 2020
LATEST SECURITY NEWS & COMMENTARY
New Android Malware Strain Sneaks Cookies from Facebook
Two malware modifications, when combined, can snatch cookies collected by browsers and social networking apps.
Russia-Based Turla APT Group's Infrastructure, Activity Traceable
Threat actor's practice of using known malware and tactics gives an opening for defenders, says Recorded Future.
Working from Home? These Tips Can Help You Adapt
COVID-19 means many people are doing their jobs from outside the confines of the office. That may not be as easy as it sounds.
Back to the Future: A Threat Intelligence Journey
Threat intelligence needs the problem solvers, the curious ones, the mission seekers, the analytical minds, the defenders, and the fierce -- whatever their gender.
New Report Shows Breach Costs Continuing to Grow
The costs associated with data breaches climb alongside the amount of data managed by the enterprise according to the latest Global Protection Index Snapshot.
Microsoft Patches Leaked Remote Code Execution Flaw
A vulnerability in Microsoft's Server Message Block protocol prompted concerns of wormable exploits when it was disclosed this week.
MORE NEWS & COMMENTARY
HOT TOPICS
COVID-19 Drives Rush to Remote Work. Is Your Security Team Ready?
A rapid transition to remote work puts pressure on security teams to understand and address a wave of potential security risks.

Attackers Distributing Malware Under Guise of Security Certificate Updates
Approach is a twist to the old method of using fake software, browser updates, Kaspersky says.

Why CSP Isn't Enough to Stop Magecart-Like Attacks
As Magecart and formjacking attacks become more sophisticated, it's essential to address not only what services may interact with users, but what that interaction looks like and how to control it.

MORE
EDITORS' CHOICE

7 Tips to Improve Your Employees' Mobile Security
Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.
How the Rise of IoT Is Changing the CISO Role
Prepare for the future by adopting a risk-based approach. Following these five steps can help.
NEW FROM THE EDGE

CASB 101: Why a Cloud Access Security Broker Matters
A CASB isn't a WAF, isn't an NGF, and isn't an SWG. So what is it, precisely, and why do you need one to go along with all the other letters? Read on for the answer.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Zero-Trust In Practice

    In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you'll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

  • Getting Down to Business: Chatbots for the Enterprise

    In this webinar, you'll learn how enterprise software agents are delivering answers to customer and employee questions today, see how conversational AI can free IT, HR, and call center staffers and others from mundane, repetitive tasks, and get guidance on ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.