Follow Dark Reading:
 November 15, 2018
LATEST SECURITY NEWS & COMMENTARY
2018 on Track to Be One of the Worst Ever for Data Breaches
A total of 3,676 breaches involving over 3.6 billion records were reported in the first nine months of this year alone.
Small-Time Cybercriminals Landing Steady Low Blows
High-end crime groups are acquiring the sorts of sophisticated capabilities only nation-states once had, while low-tier criminals maintain a steady stream of malicious activity, from cryptomining to PoS malware.
Getting to Know Magecart: An Inside Look at 7 Groups
A new report spills the details on Magecart, the criminal groups driving it, and ongoing attacks targeting low- and high-profile victims.
Google Traffic Temporarily Rerouted via Russia, China
The incident, which Google reports is now resolved, could be the result of either technical mistakes or malicious activity.
Symantec Uncovers North Korean Group's ATM Attack Malware
Lazarus Group has been using FastCash Trojan on obsolete AIX servers to empty tens of millions of dollars from ATMs.
Understanding Evil Twin AP Attacks and How to Prevent Them
The attack surface remains largely unprotected from Wi-Fi threats that can result in stolen credentials and sensitive information as well as backdoor/malware payload drops.
Empathy: The Next Killer App for Cybersecurity?
The toughest security problems involve people not technology. Here's how to motivate your frontline employees all the way from the service desk to the corner office.
MORE NEWS & COMMENTARY
HOT TOPICS
20 Cybersecurity Firms to Watch
A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.

RIP, 'IT Security'
Information security is vital, of course. But the concept of "IT security" has never made sense.

The Morris Worm Turns 30
How the historic Internet worm attack of 1988 has shaped security - or not.

MORE
EDITORS' CHOICE

7 Cool New Security Tools to be Revealed at Black Hat Europe
Black Hat Europe's Arsenal lineup will include demonstrations of tools addressing everything from unsecured cloud buckets to unknown IoT devices.
Black Hat: European Security Pros Wrestling With Potential Breaches, Privacy Issues
Black Hat Europe attendee survey shows European cybersecurity leaders are uncertain of their ability to protect end user data - and are fearful of a near-term breach of critical infrastructure.
Tech Resources
ACCESS TECH LIBRARY NOW

  • New Security Strategies for the Cloud Services Environment

    In this panel discussion, cloud experts will offer advice and recommendations on how to approach the problem of cloud security in more advanced and practical ways - and how to prepare for cloud-focused attacks that may emerge in your environment.

  • The Network of the Future is Powered by AI

    In this webinar, the CIO of Dartmouth, Mitch Davis, is joined by experts from Mist and Juniper to describe how AI-driven networks are boosting the user experience at the esteemed Ivy League college and the lessons that enterprise IT can ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.