Follow Dark Reading:
 May 23, 2019
LATEST SECURITY NEWS & COMMENTARY
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
The infamous Ryuk ransomware slammed a small company that makes heavy-duty vehicle alternators for government and emergency fleet. Here's what happened.
Q1 2019 Smashes Record For Most Reported Vulnerabilities in a Quarter
Once again, a high-proportion of the reported flaws have no current fix, according to Risk Based Security.
DDoS Attacks Up in Q1 After Months of Steady Decline
Sudden surge suggests that new actors have stepped up to the plate to replace the old operators.
Proving the Value of Security Awareness with Metrics that 'Deserve More'
Without metrics that matter to the business, awareness programs will continue to be the bastard child of security.
Satan Ransomware Adds More Evil Tricks
The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.
Demystifying the Dark Web: What You Need to Know
The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.
MORE NEWS & COMMENTARY
HOT TOPICS
97% of Americans Can't Ace a Basic Security Test
Still, a new Google study uncovers a bit of good news, too.

Attackers Are Messing with Encryption Traffic to Evade Detection
Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year.

When Older Windows Systems Won't Die
Microsoft's decision to patch unsupported machines for the critical CVE-2019-0708 flaw is a reminder that XP, 2003, and other older versions of Windows still run in some enterprises.

MORE
EDITORS' CHOICE

What You Need to Know About Zero Trust Security
The zero trust model might be the answer to a world in which perimeters are made to be breached. Is it right for your organization?
The Data Problem in Security
CISOs must consider reputation, resiliency, and regulatory impact to establish their organization's guidelines around what data matters most.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building an Incident Readiness & Response Playbook

    Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident readiness and response playbook.

  • Zero Trust in Practice

    Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. Find out how you can get started with Zero Trust today!

MORE WEBINARS
FEATURED REPORTS
  • How Enterprises Are Developing Secure Applications

    IT security and application development are disparate processes that are increasingly coming together. Here's a look at how that's happening.

  • Managing the Risk of Post-breach or Resident Attacks

    How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.