| LATEST SECURITY NEWS & COMMENTARY | Database Leaks, Network Traffic Top Data Exfiltration Methods Intellectual property and personally identifiable information tie for the type of data IT practitioners are worried about losing. Financial Data for Multiple Companies Dumped Online in Failed Extortion Bid Potential victims reportedly include Oracle, Volkswagen, Airbus and Porsche. Threat Intelligence Firms Look to AI, but Still Require Humans Machine learning and artificial intelligence are helping threat-intelligence firms cover a greater area of the darknet, but human analysts will always be necessary, experts say. Microsoft 365 Updated with New Compliance, Encryption, Privacy Controls New tools, such as Compliance Manager and Advanced Message Encryption, aim to give businesses more options for data privacy. California Consumer Privacy Act: 4 Compliance Best Practices Companies that get ahead of the January 2020 data privacy deadline can minimize the risk of sanctions and also gain a competitive advantage in the marketplace. Researchers Explore Remote Code Injection in macOS Deep Instinct analysts test three code injection methods and a custom-built Mach-O loader to load malicious files from memory. Confluence Vulnerability Opens Door to GandCrab An exploit of the vulnerability offers attackers a ransomware surface that doesn't need email. MORE NEWS & COMMENTARY | |
|
Dark Reading Daily -- Published By InformationWeek UBM Tech 2 Penn Plaza, 15th Floor, New York, NY 10121 | To update your profile, change your e-mail address, or unsubscribe, click here. | To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|