Follow Dark Reading:
 September 23, 2020
LATEST SECURITY NEWS & COMMENTARY
Vulnerability Disclosure Programs See Signups & Payouts Surge
More than $44.75 million in rewards were paid to hackers over the past year, driving total payouts beyond $100 million.
Nearly 70% of IT & Security Pros Hone Their Cyber Skills Outside of Work
New research shows how security skills are lacking across multiple IT disciplines as well - including network engineers, sys admins, and cloud developers.
Microsoft Extends Data Loss Prevention to Cloud App Security
The update, one of several announced today, is intended to help employees remain compliant when handling data across cloud applications.
Attackers Target Small Manufacturing Firms
The most common tactics include credential stuffing using valid accounts, various forms of deception, and vulnerabilities in third-party software, Rapid7 says in its latest quarterly threat report.
Startup Aims to Map and Track All the IT and Security Things
Security service JupiterOne spins off from a healthcare service provider's homegrown technology.
New Google Search Hacks Push Viruses & Porn
Three incidents demonstrate how cybercriminals leverage the scourge of black-hat search engine optimization to manipulate search results.
Permission Management & the Goldilocks Conundrum
In today's COVID-19 era, managing access has become even more difficult, especially for large organizations. Here's how to get it "just right."
MORE NEWS & COMMENTARY
HOT TOPICS
A Hacker's Playlist
Nine security researchers share their favorite songs and genres.

Deadly Ransomware Story Continues to Unfold
A ransomware attack with fatal consequences is attracting notice and comment from around the world.

h2c Smuggling: A New 'Devastating' Kind of HTTP Request
The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.

MORE
EDITORS' CHOICE

12 Bare-Minimum Benchmarks for AppSec Initiatives
The newly published Building Security in Maturity Model provides the software security basics organizations should cover to keep up with their peers.
Hacking Yourself: Marie Moe and Pacemaker Security
Future consumer devices, including pacemakers, should be built with security from the start.
NEW FROM THE EDGE

Can Schools Pass Their Biggest Cybersecurity Test Yet?
Understaffed, underfunded, and underequipped, IT teams in the K-12 sector face a slew of challenges amid remote and hybrid learning models. Here's where they can begin to protect their schools against cyberattacks.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Deception: The Next Step In Cyber Defense

    All organizations have tools and strategies for keeping attackers out. But what if you could distract and frustrate attackers by making them *think* they've gotten your crown jewels? In this webinar, experts discuss emerging tools and strategies for cyber threat ...

  • Enterprise Database Strategies for 2020

    In this webinar you will learn from experts how database technology is adapting to and embracing an enterprise IT environment built to support advanced analytics and AI.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.