Follow Dark Reading:
 May 13, 2019
LATEST SECURITY NEWS & COMMENTARY
Demystifying the Dark Web: What You Need to Know
The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.
Hackers Still Outpace Breach Detection, Containment Efforts
Research shows time to discovery and containment of breaches slowly shrinking, but attackers don't need a very big window to do a lot of damage.
How We Collectively Can Improve Cyber Resilience
Three steps you can take, based on Department of Homeland Security priorities.
Symantec CEO Greg Clark Steps Down
Exec shake-up comes amid earnings drop in financial report.
Microsoft SharePoint Bug Exploited in the Wild
A number of reports show CVE-2019-0604 is under active attack, Alien Labs researchers say.

Name That Toon: End User Lockdown

We provide the cartoon. You write the caption! Enter and win a $25 Amazon gift card.


MORE NEWS & COMMENTARY
HOT TOPICS
Russian Nation-State Group Employs Custom Backdoor for Microsoft Exchange Server
Turla hacking team abuses a legitimate feature of the Exchange server in order to hide out and access all of the target organization's messages.

How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.

Social Engineering Slams the C-Suite: Verizon DBIR
Criminals are also going after cloud-based email accounts, according to Verizon's '2019 Data Breach Investigations Report.'

MORE
EDITORS' CHOICE

7 Types of Experiences Every Security Pro Should Have
As the saying goes, experience is the best teacher. It'll also make you a better and more well-rounded security pro.
The Big E-Crime Pivot
Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • Managing the Risk of Post-breach or Resident Attacks

    How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

  • Online Malware & Threats: A Profile of Today's Security Posture

    This Dark Reading report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.