| LATEST SECURITY NEWS & COMMENTARY | US Accuses China of Using Criminal Hackers in Cyber Espionage Operations DOJ indicts four Chinese individuals for alleged role in attacks targeting intellectual property, trade secrets belonging to defense contractors, maritime companies, aircraft service firms, and others. Law Firm for Ford, Pfizer, Exxon Discloses Ransomware Attack Campbell Conroy & O'Neil reports the attack affected personal data including Social Security numbers, passport numbers, and payment card data for some individuals. NSO Group Spyware Used On Journalists & Activists Worldwide An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world. 7 Ways AI and ML Are Helping and Hurting Cybersecurity In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they can create significant harm. Breaking Down the Threat of Going All-In With Microsoft Security Limit risk by dividing responsibility for infrastructure, tools, and security. (Sponsored Article) Cybersecurity Supply Chain Risk Is Not a Zero-Day Threat With an increasing number of public supply chain attacks, it's important to remember that there are established frameworks that can significantly reduce risk. MORE NEWS & COMMENTARY | |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech 303 Second St., Suite 900 South Tower, San Francisco, CA 94107 | To update your profile, change your e-mail address, or unsubscribe, click here. | To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|