Follow Dark Reading:
 September 09, 2021
LATEST SECURITY NEWS & COMMENTARY
Cybercriminals See Bountiful Harvest in Food Supply Chain

Agriculture and food companies are seeing increased attacks from ransomware groups targeting the industry, prompting the DoJ and security firms to issue warnings.

Attackers Moving Faster Inside Target Networks

Criminals begin moving laterally inside a target network within 92 minutes of gaining access and demonstrate new stealthy capabilities, a new report shows.

FireMon Acquires DisruptOps, Gains Cloud Security Operations Capabilities

The acquisition will help FireMon deliver capabilities for detecting security threats to enterprise data in public cloud infrastructure, CEO Jody Brazil says.

I Moved to Cybersecurity After a Decade in Finance — Here's How You Can Too

The cybersecurity industry needs employees with nontraditional backgrounds who can offer fresh perspectives. Here are tips for making a career switch to this growing and exciting field.

Hackers Shut Down a Pipeline. How Should the Energy Sector Respond?

With all eyes on cybersecurity, the energy and utilities industries are adopting zero-trust frameworks. Here are three key steps to implementing zero trust for critical industries.

Email Fraud Scheme Sends Victims to Fake Cryptocurrency Platforms

Malicious emails promise hundreds of thousands of dollars in cryptocurrency to victims and sends credentials to alleged private Bitcoin investment platforms.

Microsoft Windows Zero-Day Under Attack

Microsoft has published mitigations and workarounds for a remote code execution vulnerability in MSHTML.

MORE NEWS / MORE COMMENTARY
HOT TOPICS
Chenxi Wang: From Security Research to Developing the Next Generation of Security Leaders
Security Pro File: After stints as an industry analyst and security executive for different companies, Chenxi Wang is developing the next-generation of security companies and women executives in security.

Back to School Pivots to Hack the School
Any state with a vibrant economy — and schools — should be considered big targets for ransomware attackers.

New Malware Uses Novel Fileless Technique to Evade Detection
PRIVATELOG and its installer STASHLOG first to use Common Log File System to stash secondary payload, Mandiant researchers say.

MORE
EDITORS' CHOICE

Major New OpenSSL Released
A key part of the cryptographic infrastructure of the Internet, OpenSSL has turned 3.0, but rival Rust-based TLS, Rustls, promises to head off future security vulnerabilities.
The Great Payment Debate: How to Evaluate Your Ransomware Response
With ransomware attacks on the rise, all organizations must assume they will eventually be a target and start putting prevention and mitigation strategies in place now.
LATEST FROM THE EDGE

Edge Chat with Cisco Secure's TK Keanini on Achieving Better Security Outcomes
The latest installment of Edge Chats focuses on how security teams can achieve better security outcomes with an open platform.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Detecting and Stopping Online Attacks

    Today's cyber attackers can compromise your systems using a variety of methods, from well-disguised malware to sophisticated, targeted exploits aimed right at your company. How can you identify these attacks quickly and respond effectively? In this Dark Reading webinar, top ...

  • Security Alert Fatigue: How to Wake Up and Take Back Control of your SOC

    In this webinar, learn expert tips on how to improve your processes and use orchestration to relieve security alert fatigue, get the most out of your security investments and improve your cyber incident response.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.