Follow Dark Reading:
 May 20, 2019
LATEST SECURITY NEWS & COMMENTARY
Q1 2019 Smashes Record For Most Reported Vulnerabilities in a Quarter
Once again, a high-proportion of the reported flaws have no current fix, according to Risk Based Security.
When Older Windows Systems Won't Die
Microsoft's decision to patch unsupported machines for the critical CVE-2019-0708 flaw is a reminder that XP, 2003, and other older versions of Windows still run in some enterprises.
DevOps Repository Firms Establish Shared Analysis Capability
Following an attack on their users, and their shared response, Atlassian, GitHub, and GitLab decide to make the sharing of attack information a permanent facet of their operations.
A Trustworthy Digital Foundation Is Essential to Digital Government
Agencies must take steps to ensure that citizens trust in the security of government's digital channels.
Artist Uses Malware in Installation
A piece of 'art' currently up for auction features six separate types of malware running on a vulnerable computer.
Exposed Elasticsearch Database Compromises Data on 8M People
Personal data exposed includes full names, physical and email addresses, birthdates, phone numbers, and IP addresses.
MORE NEWS & COMMENTARY
HOT TOPICS
Attackers Are Messing with Encryption Traffic to Evade Detection
Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year.

Effective Pen Tests Follow These 7 Steps
Third-party pen tests are part of every comprehensive security plan. Here's how to get the most from this mandatory investment.

Microsoft Patches Wormable Vuln in Windows 7, 2003, XP, Server 2008
Microsoft releases security updates for some out-of-support systems to fix a bug that could be weaponized as a worm if exploited.

MORE
EDITORS' CHOICE

Demystifying the Dark Web: What You Need to Know
The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.
Missing in Action: Cybersecurity Professionals
Just as every organization security team's needs are unique, so are the reasons for the shortage of candidates for open positions. Here are five strategies to help you close the gap.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • The State of Cyber Security Incident Response

    Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.

  • Managing the Risk of Post-breach or Resident Attacks

    How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.