Follow Dark Reading:
 September 27, 2019
LATEST SECURITY NEWS & COMMENTARY
5 Updates from PCI SSC That You Need to Know
As payment technologies evolve, so do the requirements for securing cardholder data.
Voting Machine Systems New & Old Contain 'Design' Flaws
DEF CON Voting Village organizers presented a final report on their findings at the Capitol.
Mass Exploitation of vBulletin Flaw Raises Alarm
The remote code execution bug was a 0-day when it was publicly disclosed Monday, but has now been patched.
Cloud-Native Applications: Shift to Serverless is Underway
A new report explores changes in cloud-native applications and complexities involved with securing them.
Why You Need to Think About API Security
Businesses of all sorts are increasingly relying on APIs to interact with customers in smartphone apps, but they have their own unique set of vulnerabilities.
Airbus Cyberattack Landed on Suppliers' Networks
Four separate incidents over the past year have targeted Airbus suppliers for the manufacturer's sensitive commercial data.
Ransomware Hits Multiple, Older Vulnerabilities
Ransomware attacks are taking advantage of vulnerabilities that are older and less severe, a new report finds.
MORE NEWS & COMMENTARY
HOT TOPICS
Metasploit Creator HD Moore's Latest Hack: IT Assets
Moore has built a network asset discovery tool that wasn't intended to be a pure security tool, but it addresses a glaring security problem.

Ransomware Strikes 49 School Districts & Colleges in 2019
The education sector has seen 10 new victims in the past nine days alone, underscoring a consistent trend throughout 2019.

Iranian Government Hackers Target US Veterans
'Tortoiseshell' discovered hosting a phony military-hiring website that drops a Trojan backdoor on visitors.

MORE
EDITORS' CHOICE

7 Ways VPNs Can Turn from Ally to Threat
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.
Bridging the Gap Between Security & DevOps
An inside look into the engineering mindset of DevOps from the vantage of a career security professional.
NEW FROM THE EDGE

Why Clouds Keep Leaking Data
Most devastating cloud data leaks are caused by the same kinds of common cloud security challenges and configuration errors. Here's what you need to know.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.