Dark Reading highlights women who are quietly changing the game in cybersecurity.
| LATEST SECURITY NEWS & COMMENTARY | Log4j and Livestock Apps: APT41 Wages Persistent Cyberattack Campaign on US Government The group's attack methods have included exploits for a zero-day vulnerability in a livestock-tracking apps as well as for the Apache Log4 flaw. Google to Buy Mandiant, Aims to Automate Security Response In a deal worth $5.4 billion, Google would expand its security portfolio with managed detection and response (MDR) and threat intelligence, with an increasing focus on automation. Most Cybersecurity Vendors at Risk Due to Internet-Exposed IT Assets Study shows more than 97% have exposed assets on AWS — among a wide range of other issues. Accelerated Ransomware Attacks Pressure Targeted Companies to Speed Response Threat actors have focused on two ends of the spectrum — quick, impactful attacks or stealthy intrusions — making strong prevention and faster response more important for enterprises. Trio of Vendors Offer Free Services to Organizations at Risk of Russian Cyberattacks CrowdStrike, Cloudflare, and Ping Identity have teamed up with tools and services for the healthcare, power, and water industries as a way to quickly bolster their security on several fronts. Medical and IoT Devices From More Than 100 Vendors Vulnerable to Attack PTC has issued patches for seven vulnerabilities — three critical — in its widely used Axeda remote management technology. Microsoft Patches Critical Exchange Server Flaw Remote code execution vulnerability among 71 bug fixes issued in March Patch Tuesday. FBI Alert: Ransomware Attacks Hit Critical Infrastructure Organizations Bureau releases indicators of compromise for the RagnarLocker ransomware that has hit 10 different critical infrastructure sectors. Why the World Needs a Global Collective Cyber Defense This sort of approach would enable cross-company and cross-sector threat information sharing, an effort that would allow companies to easily turn data into actionable insights. Breaking the Bias for International Women’s Day 2022 The theme of International Women’s Day 2022 is "Break the bias." This is what #BreaktheBias means to me. How to Get One Step Ahead of Mobile Attacks The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users. 7 Essentials for More Security-Aware Design Automation Electronic design automation solutions, software programs that help designers develop electronic systems and semiconductor chips, can be used in service of security assurance. MORE NEWS / MORE COMMENTARY | | |
|
| FEATURED REPORTS | How Enterprises Are Assessing Cybersecurity Risk in Today's Environment Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns. How Data Breaches Affect the Enterprise Many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download this report to delve more into this timely topic. | MORE REPORTS |
|
|
Dark Reading Weekly -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To update your profile, change your e-mail address, or unsubscribe, click here. | To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|