Follow Dark Reading:
 June 30, 2022
LATEST SECURITY NEWS & COMMENTARY
Patch Now: Linux Container-Escape Flaw in Azure Service Fabric
Microsoft is urging organizations that don't have automatic updates enabled to update to the latest version of Linux Server Fabric to thwart the "FabricScape" cloud bug.
ZuoRAT Hijacks SOHO Routers From Cisco, Netgear
The malware has been in circulation since 2020, with sophisticated, advanced malicious actors taking advantage of the vulnerabilities in SOHO routers as the work-from-home population expands rapidly.
Cyberattacks via Unpatched Systems Cost Orgs More Than Phishing
External attacks focused on vulnerabilities are still the most common ways that companies are successfully attacked, according to incident data.
Broken Authentication Vuln Threatens Amazon Photos Android App
The now-patched bug allows an attacker to gain full access to a user's Amazon files.
How to Master the Kill Chain Before Your Attackers Do
In the always-changing world of cyberattacks, preparedness is key.
Shifting the Cybersecurity Paradigm From Severity-Focused to Risk-Centric
Embrace cyber-risk modeling and ask security teams to pinpoint the risks that matter and prioritize remediation efforts.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Facebook Business Pages Targeted via Chatbot in Data-Harvesting Campaign
The clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.

Can Zero-Knowledge Cryptography Solve Our Password Problems?
Creating temporary keys that are not stored in central repositories and time out automatically could improve security for even small businesses.

New Vulnerability Database Catalogs Cloud Security Issues
Researchers have created a new community website for reporting and tracking security issues in cloud platforms and services — plus fixes for them where available.

MORE
EDITORS' CHOICE
China-Backed APT Pwns Building-Automation Systems with ProxyLogon
The previously unknown state-sponsored group is compromising industrial targets with the ShadowPad malware before burrowing deeper into networks.
LATEST FROM THE EDGE

What's Your AppSec Personality?
It's time to decide which role to play to best serve your organization's security needs: an auditor, a lawyer, or a developer.
LATEST FROM DR TECHNOLOGY

Can Zero-Knowledge Cryptography Solve Our Password Problems?
Creating temporary keys that are not stored in central repositories and time out automatically could improve security for even small businesses.
LATEST FROM OMDIA

RSA 2022: Omdia Research Take Aways
The RSA conference in San Francisco always feels like drinking from a fire hose but especially this year at the first in-person RSA since the pandemic began.
WEBINARS
  • Building and Maintaining an Effective Remote Access Strategy

    The COVID-19 pandemic transformed enterprises into remote workplaces overnight, forcing IT organizations to revamp their computing and networking strategies on the fly. Some of the changes were intended to be temporary, and some rules were adopted without thinking through all ...

  • How Ransomware Works - And What You Can Do to Stop It

    From Darkside, to Lockbit, to Conti, ransomware gangs pulled off many headline-making attacks in the last year and they have evolved their techniques to become more stealthy and sophisticated when targeting organizations. In this webinar, experts walk you through the ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
  • State of the Cloud: A Security Perspective

    Cloud computing has evolved over the years from a nice-to-have item on the IT wish list to a core technology driving business initiatives. But despite widespread adoption, cloud-based IT systems continue to be saddled with issues related to data security, ...

  • Rethinking Endpoint Security in a Pandemic and Beyond

    IT security teams are expending the concept of "endpoint security" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple ...

  • How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World

    Dark Reading's 2022 Endpoint Security Report examines how IT and cybersecurity professionals are grappling with the impact of pandemic-related changes on endpoint security strategies. The report explores how they are building their endpoint security defenses, and provides insight on what organizations ...

View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.