Follow Dark Reading:
 May 23, 2019
LATEST SECURITY NEWS & COMMENTARY
DDoS Attacks Up in Q1 After Months of Steady Decline
Sudden surge suggests that new actors have stepped up to the plate to replace the old operators.
Alphabet's Chronicle Explores Code-Signing Abuse in the Wild
A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security.
Consumer IoT Devices Are Compromising Enterprise Networks
While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks.
The 3 Cybersecurity Rules of Trust
Every day, keeping anything secure requires being smart about trust. The rules of trust will keep you and your data safer.
Baltimore Email, Other Systems Still Offline from May 7 Ransomware Attack
The city's mayor says there's no 'exact timeline on when all systems will be restored.'
Google Alerts Admins to Unhashed Password Storage
The company reports it has seen improper access to, or misuse of, affected enterprise G Suite credentials.
New Software Skims Credit Card Info From Online Credit Card Transactions
The new exploit builds a fake frame around legitimate portions of an online commerce website.
MORE NEWS & COMMENTARY
HOT TOPICS
97% of Americans Can't Ace a Basic Security Test
Still, a new Google study uncovers a bit of good news, too.

How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
The infamous Ryuk ransomware slammed a small company that makes heavy-duty vehicle alternators for government and emergency fleet. Here's what happened.

Attackers Are Messing with Encryption Traffic to Evade Detection
Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year.

MORE
EDITORS' CHOICE

What You Need to Know About Zero Trust Security
The zero trust model might be the answer to a world in which perimeters are made to be breached. Is it right for your organization?
Proving the Value of Security Awareness with Metrics that 'Deserve More'
Without metrics that matter to the business, awareness programs will continue to be the bastard child of security.
Data Asset Management: What Do You Really Need?
At Interop, a cybersecurity and privacy leader explains her approach to data management and governance at a massive, decentralized company.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • How Enterprises Are Developing Secure Applications

    IT security and application development are disparate processes that are increasingly coming together. Here's a look at how that's happening.

  • Managing the Risk of Post-breach or Resident Attacks

    How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.