Government crackdowns may destabilize Russian crime rings and strengthen their ties to Chinese allies.
Follow Dark Reading:
 February 19, 2022
LATEST SECURITY NEWS & COMMENTARY
Ransomware Adds New Wrinkle in Russian Cybercrime Market
Government crackdowns may destabilize Russian crime rings and strengthen their ties to Chinese allies.
Where AI Falls Down in Cybersecurity
Many cybersecurity products claim to incorporate AI in some way, but in some cases, those claims aren't completely accurate.
How Nonprofits Can Evade Ransomware Attacks
Just as small businesses can't be complacent, nonprofits also need to prepare for cyberattacks.
Be Flexible About Where People Work — But Not on Data Privacy
If your policies don't keep up with your work models, your company's sensitive information could be at risk.
Security Teams Expect Attackers to Go After End Users First
Phishing, malware, and ransomware have spurred organizations to increase their investments in endpoint security, according to Dark Reading’s Endpoint Security Survey.
Edge Chat: Embarking on the SASE Journey
Cisco Secure's Raviv Levi and Dark Reading's Terry Sweeney discuss secure access service edge and how to secure users and applications regardless of location.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Retailers' Offboarding Procedures Leave Potential Risks
IT teams need to consider unforeseen threats to avoid violating privacy regulations and supplier contracts.

5 Reasons Why Civil Discourse Is Good for Security
A cordial environment helps valuable input reach those who can use it to improve the organization's security posture.

Bot Marketplaces as a Source of Future Data Breaches
Of the four bot marketplaces Cognyte analyzed, the Russian Market is the most dominant, but the others are all active, updated daily, and well-known, too.

MORE
EDITORS' CHOICE

Name That Edge Toon: Head of the Table
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
FROM THE NEWS DESK

Russian Actors Targeting US Defense Contractors in Cyber Espionage Campaign, CISA Warns
Sensitive data stolen on US weapons development and deployment, product development, foreign partnerships, contracts, and more.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.