Follow Dark Reading:
 January 21, 2021
LATEST SECURITY NEWS & COMMENTARY
SolarWinds Attack Underscores 'New Dimension' in Cyber-Espionage Tactics
Meanwhile, Malwarebytes is the latest victim, Symantec discovers a fourth piece of malware used in the massive attack campaign, and FireEye Mandiant releases a free tool to help spot signs of the attack.
Successful Malware Incidents Rise as Attackers Shift Tactics
As employees moved to working from home and on mobile devices, attackers followed them and focused on weekend attacks, a security firm says.
Microsoft Releases New Info on SolarWinds Attack Chain
Threat actors went to elaborate lengths to maintain operational security around second-stage payload activation, company says.
Vulnerabilities in Popular DNS Software Allow Poisoning
Seven flaws in DNSMasq have limited impact, but in combination they could be chained to create a multistaged attack.
SolarWinds Attack, Cyber Supply Chain Among Priorities for Biden Administration
During Senate confirmation hearings, the nominees for Secretary of Homeland Security and Director of National Intelligence pledged to focus on cybersecurity.
Rethinking IoT Security: It's Not About the Devices
Keeping IoT safe in the future will require securing the networks themselves. Focusing on the devices is a never-ending battle that will only become more burdensome.
A Security Practitioner's Guide to Encrypted DNS
Best practices for a shifting visibility landscape.
How to Achieve Collaboration Tool Compliance
Organizations must fully understand the regulatory guidance on collaboration security and privacy so they can continue to implement and expand their use of tools such as Zoom and Teams.
NSA Appoints Rob Joyce as Cyber Director
Joyce has long worked in US cybersecurity leadership, most recently serving as the NSA's top representative in the UK.
Microsoft to Launch 'Enforcement Mode' for Zerologon Flaw
Enforcement mode for the Netlogon Domain Controller will be enabled by default with the Feb. 9 security update.
MORE NEWS & COMMENTARY
HOT TOPICS
Shifting Privacy Landscape, Disruptive Technologies Will Test Businesses
A new machine learning tool aims to mine privacy policies on behalf of users.

Who Is Responsible for Protecting Physical Security Systems From Cyberattacks?
It's a question that continues to engage debate, as the majority of new physical security devices being installed are now connected to a network. While this offers myriad benefits, it also raises the question: Who is responsible for their cybersecurity?

Understanding TCP/IP Stack Vulnerabilities in the IoT
Internet of Things devices are highly susceptible to attacks, breaches, and flaws emanating from issues within the TCP/IP network communications architecture. Here's an overview of what you need to know to mitigate risks.

MORE
EDITORS' CHOICE

The Most Pressing Concerns Facing CISOs Today
Building security into the software development life cycle creates more visibility, but CISOs still need stay on top of any serious threats on the horizon, even if they are largely unknown.
Tips for a Bulletproof War Room Strategy
The techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets.
LATEST FROM THE EDGE

4 Intriguing Email Attacks Detected by AI in 2020
Here's to the sneakiest of the sneaky. These clever phishing messages -- that standard validation measures often missed -- deserve proper dishonor. (Sponsored)
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.