Follow Dark Reading:
 March 16, 2019
LATEST SECURITY NEWS & COMMENTARY
Proof-of-Concept Tracking System Finds RATs Worldwide
Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.
Could Beto O'Rourke Become the First Hacker President?
New report details the Democratic candidate's time as a member of Cult of the Dead Cow.
On Norman Castles and the Internet
When the Normans conquered England, they built castles to maintain security. But where are the castles of the Internet?
Criminals Use One Line of Code to Steal Card Data from E-Commerce Sites
New JavaScript sniffer is similar to malware used in the Magecart campaign last year that affected over 800 sites.
MORE NEWS & COMMENTARY
HOT TOPICS
Citrix Breach Underscores Password Perils
Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.

It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Meanwhile, organizations are looking at unconventional ways to staff up and train their workforce as technical expertise gets even harder to find.

3 Places Security Teams Are Wasting Time
Dark Reading caught up with RSA Security president Rohit Ghai at the RSA Conference to discuss critical areas where CISOs and their teams are spinning their wheels.

MORE
EDITORS' CHOICE

6 Tax Season Tips for Security Pros
Here are some practical ways to ensure your company's safety as Uncle Sam comes calling.
IoT Anomaly Detection 101: Data Science to Predict the Unexpected
Yes! You can predict the chance of a mechanical failure or security breach before it happens. Part one of a two-part series.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • Dark Reading Report Roundup

    We've compiled all our latest reports in one place. Check them out today!

  • Managing the Risk of Post-breach or Resident Attacks

    How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.