A few "alarming" infiltrations of OT networks by previously unknown threat groups occurred last year as well.
Follow Dark Reading:
 February 24, 2022
LATEST SECURITY NEWS & COMMENTARY
Ransomware Trained on Manufacturing Firms Led Cyberattacks in Industrial Sector
Meanwhile, a few "alarming" infiltrations of OT networks by previously unknown threat groups occurred last year as well.
More Orgs Suffered Successful Phishing Attacks in 2021 Than in 2020
Threat actors maintained their relentless attacks on enterprise end users for yet another year, new study shows.
Microsoft Debuts Unified Service for Multicloud ID Management
With nine in 10 companies adopting a multicloud strategy, service providers are focused on finding ways to support the management and security efforts of businesses that rely on multiple cloud resources.
Key Application Security Metrics Show Few Signs of Improvement
A new study shows that organizations continued to take an inordinately long time to fix vulnerabilities and fixed fewer known issues in their environments last year than in 2020.
Attackers Hone Their Playbooks, Become More Agile
Less malware, more interactive intrusions, and big game hunting lead to more success, with an 82% increase in ransomware-related data leaks.
New Data-Wiping Malware Discovered on Systems in Ukraine
Researchers were scrambling to analyze a newly discovered piece of data-wiping malware found in the wild.
NSA Issues Guidance for Selecting Strong Cisco Password Types
Poorly protected passwords in device configuration files present a risk of compromise, agency says.
Open Source Code: The Next Major Wave of Cyberattacks
The ubiquity of open source software presents a significant security risk, as it opens the door for vulnerabilities to be introduced (intentionally or inadvertently) to those who use it.
Ukraine DDoS: 'Cyberattack' or Not?
The country was hit by a distributed denial-of-service attack on Feb. 15, but some say that doesn't rise to the level of "cyberattack." Here's why they're wrong.
Name That Toon: Out in the Cold
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Hidden Costs of a Data Breach
Don't consider just the initial costs. Hidden factors include remediation, revenue loss, reputational harm, national security — even human life.
Free Cybersecurity Tools and Services List Published by CISA
The Cybersecurity & Infrastructure Security Agency (CISA) says this "living repository" is a mix of popular open source and free tools and services from both the private and public sectors.
CISA Warns of New Malware Framework Used by Russian 'Sandworm' Hacking Team
Russian General Staff Main Intelligence Directorate (GRU) hacking team appears to have swapped its VPNFilter malware platform for the so-called Cyclops Blink malware framework.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
4 Keys to Bridging the Gap Between Security and Developers
Security personnel's priority is protecting the organization. Developers are trying to hit tight timelines. Here's how both groups can get get their needs met.

If the Cloud Is More Secure, Then Why Is Everything Still Broken?
The sooner we discover sources of risk, the better equipped we will be to create effective mitigations for them.

Why Passwordless Is at an Impasse
Many widely used business applications aren't built to support passwordless login because identity and authentication remain siloed.

MORE
EDITORS' CHOICE

8 of the Biggest Cybersecurity M&As & Investment Deals in 2021
There were more financial deals in cybersecurity last year than in any previous year.
LATEST FROM THE EDGE

How Instituting a 'Just Culture' Improves Security
Rather than focusing on blame, the framework identifies the root cause of failure and then takes steps to fix it.
LATEST FROM DR TECHNOLOGY

JupiterOne Unveils Starbase for Graph-Based Security
The open source asset management tool lets security analysts collect asset information all across the organization's digital operations and run queries to understand their relationships.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.