Follow Dark Reading:
 June 17, 2021
LATEST SECURITY NEWS & COMMENTARY
Ransomware Operators' Strategies Evolve as Attacks Rise
Security researchers find ransomware operators rely less on email and more on criminal groups for initial access into target networks.
Ukraine Police Disrupt Cl0p Ransomware Operation
Growing list of similar actions in recent months may finally be scaring some operators into quitting, but threat is far from over, security experts say.
Biden Tells Putin Critical Infrastructure Sectors 'Off Limits' to Russian Hacking
President Joe Biden said he and Russian President Vladimir Putin agreed to discuss boundaries in cyber activity.
Keeping Your Organization Secure When Dealing With the Unexpected
There's no way to anticipate every possible scenario, but the right approach to business continuity can help you respond effectively in any situation.
Cars, Medicine, Electric Grids: Future Hackers Will Hit Much More Than Networks in an IT/OT Integrated World
Intelligent systems must include the right cybersecurity protections to prevent physical threats to operational technology.
Don't Get Stymied by Security Indecision
You might be increasing cyber-risk by not actively working to reduce it.
Security Flaw Discovered In Peloton Equipment
The vulnerability could give attackers remote root access to the bike's tablet, researchers report.
Russian National Convicted on Charges Related to Kelihos Botnet
Oleg Koshkin was arrested in 2019 and faces a maximum penalty of 15 years in prison, the DoJ reports.
MORE NEWS & COMMENTARY
HOT TOPICS
11 Cybersecurity Vendors to Watch in 2021
The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.

How Does the Government Buy Its Cybersecurity?
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.

How President Biden Can Better Defend the US From Russian Hacks
Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.

MORE
EDITORS' CHOICE

Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.
What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.
LATEST FROM THE EDGE

Is an Attacker Living Off Your Land?
Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.