Follow Dark Reading:
 July 08, 2021
LATEST SECURITY NEWS & COMMENTARY
Cyberattack on Kaseya Nets More Than 1,000 Victims, $70M Ransom Demand
The provider of remote monitoring and management services warns customers to not run its software until a patch is available and manually installed.
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Automation allowed a REvil affiliate to move from exploitation of vulnerable servers to installing ransomware on downstream companies faster than most defenders could react.
Microsoft Issues New CVE for 'PrintNightmare' Flaw
Company says remote code execution issue in all Windows versions is different from one in Windows Print Spooler that it had patched last month, though both affect same function.
Microsoft Releases Emergency Patch for 'PrintNightmare' Vuln
It urges organizations to immediately apply security update, citing exploit activity.
NSA & CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs
Fancy Bear nation-state hacking team add a modern twist on old-school hacking method by using a cluster of Kubernetes software containers to expedite credential theft.
CISA Urges Orgs to Disable Windows Print Spooler on Critical Systems
Patches Microsoft issued last month not effective against exploits targeting "PrintNightmare" flaw, agency and others say.
5 Mistakes That Impact a Security Team's Success
The way we work and treat each other go a long way in improving our organizations' security posture.
Watch for Cybersecurity Games at the Tokyo Olympics
The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications.
Stop Playing Catchup: Move From Reactive to Proactive to Defeat Cyber Threats
One-time reactive measures can't keep up. It's time to be proactive and pick our swords and not just our shields.
SOC Investment Improves Detection and Response Times, Data Shows
A survey of IT and security pros finds many are confident in their ability to detect security incidents in near-real time or within minutes.
CISA Updates CSET Tool for Ransomware Defense
A new module provides a set of practices to help organizations assess how well-equipped they are to defend and recover from ransomware.
MORE NEWS & COMMENTARY
HOT TOPICS
WFH: A Smart Time to Revisit Employee Use of Social Media
Employers have their hands full when it comes to monitoring online activities that could hurt the brand or violate the organization's core values.

Name That Edge Toon: Security Grill
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

GitHub Unveils AI Tool to Speed Development, but Beware Insecure Code
The company has created an AI system, dubbed Copilot, to offer code suggestions to developers, but warns that any code produced should be tested for defects and vulnerabilities.

MORE
EDITORS' CHOICE

9 Hot Trends in Cybersecurity Mergers & Acquisitions
Security experts share their observations of the past year in cybersecurity M&A, highlighting key trends and notable deals.
Why Are There Never Enough Logs During an Incident Response?
Most security pros believe their responses could be dramatically quicker were the right logs available, and usually they're not.
LATEST FROM THE EDGE

Security 101: The 'PrintNightmare' Flaw
A closer look at the printer software vulnerability - and what you can do about it.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Threat Intelligence into Your Enterprise Security Strategy

    In recent years, many enterprises have discovered that they can improve their defenses by collecting data about broad trends in online attacks that may pertain to their own IT environments. This "threat intelligence" can make it easier for security teams ...

  • Weaknesses in Software Supply Chains: Cyber's Unspoken Reality

    Until the recent SolarWinds compromise, the conversation around supply chains - and more importantly, their vulnerabilities - was rarely discussed in the cybersecurity industry. However, over the last few years, supply chains have become an increasingly lucrative target for hackers. ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.