Beyond the devices that use them, Wi-Fi hubs themselves can leak interesting data, thanks to some quirks in Apple's geolocation system. [TechWeb]( Follow Dark Reading:
[RSS](
July 09, 2024 LATEST SECURITY NEWS & COMMENTARY [Apple Geolocation API Exposes Wi-Fi Access Points Worldwide](
Beyond the devices that use them, Wi-Fi hubs themselves can leak interesting data, thanks to some quirks in Apple's geolocation system.
[Cyber-Insurance Prices Plummet as Market Competition Grows](
Now may be a good time to find good deals on insurance coverage for ransomware and security incidents.
['CloudSorcerer' Leverages Cloud Services in Cyber-Espionage Campaign](
The newly discovered APT's main weapon is a malware tool that can change behavior depending on the process in which it is running.
[10B Passwords Pop Up on Dark Web 'RockYou2024' Release](
The passwords, dumped on a cyber-underground forum on July 4 by a hacker called "ObamaCare," were collected from a variety of older and more recent breaches.
[Deconstructing Security Assumptions to Ensure Future Resilience](
By breaking down fundamental assumptions, we can proactively plan for, and begin to achieve, future resilience.
[Identity Orchestration Is Gaining Traction](
Identity orchestration products are increasingly projected to be introduced to the market in the next couple of years. Market trends and benefits of identity orchestration are explored.
[(Sponsored Article) A Watershed Moment for Threat Detection and Response](
Cloud attackers are outpacing the capabilities of endpoint detection and response, so organizations must transition to more advanced cloud detection and response. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [A CISO's Guide to Avoiding Jail After a Breach]( Yahoo, Uber, SolarWinds â increasingly, the government is incentivizing better corporate security by punishing the individuals leading it. Is that a good idea? And how can security pros avoid ending up on the butt end of a lawsuit?
[Euro Vishing Fraudsters Add Physical Intimidation to Arsenal]( The persistent threat of social engineering tactics sees cybercriminals blending technology with human manipulation to exploit individuals.
[Are SOC 2 Reports Sufficient for Vendor Risk Management?]( SOC 2 reports are a valuable tool for evaluating vendor security, but they shouldn't be the only piece of the puzzle.
[Patch Now: Cisco Zero-Day Under Fire From Chinese APT]( Threat actor "Velvet Ant" has been exploiting a vulnerability in Cisco's NX-OS Software for managing a variety of switches, executing commands and dropping custom malware. [MORE]( PRODUCTS & RELEASES [Bloom Health Centers Provides Notice of Data Security Incident]( [Human Technology Inc. â Notification of Data Breach]( [Interlock Launches ThreatSlayer Web3 Security Extension and Incentivized Crowdsourced Internet Security Community]( [Implementing Zero Trust and Mitigating Risk: ISC2 Courses to Support Your Development]( [Odaseva Raises $54M Series C Round to Expand Product Offerings and Continue Category Leadership](
[MORE PRODUCTS & RELEASES]( EDITORS' CHOICE [Euro 2024 Becomes Latest Sporting Event to Attract Cyberattacks](
Cybercriminals are selling credentials linked to the tournament on underground markets, with some geopolitics playing out in denial-of-service attacks. LATEST FROM THE EDGE [5 Ways to Run Security as a Meritocracy](
Actions speak louder than words. Here are five tips for encouraging a security culture based on achievements. LATEST FROM DR TECHNOLOGY [Google Opens $250K Bug Bounty Contest for VM Hypervisor](
If security researchers can execute a guest-to-host attack using a zero-day vulnerability in the KVM open source hypervisor, Google will make it worth their while. LATEST FROM DR GLOBAL [South Africa National Healthcare Lab Still Reeling From Ransomware Attack](
The cyberattack disrupted national laboratory services, which could slow response to disease outbreaks such as mpox, experts warn. WEBINARS - [The CIOs Guide to Enhancing GRC in 2024]( When structured correctly, Governance, Risk, and Compliance (GRC) can enable enterprises to align IT and business goals, while mitigating risks and abiding by industry and government requirements. Effectively manage your resources and unify your enterprise by utilizing emerging technology that ... - [Smart Service Management]( Attend this webinar to get real-life examples of how teams are expediting response time, decreasing team drain, and increasing self-service adoption. [View More Dark Reading Webinars >>]( WHITE PAPERS - [The Three-Point Action Plan for new CISOs](
- [State of Enterprise Cloud Security](
- [The Forrester Waveâ¢: External Threat Intelligence Service Providers, Q3 2023](
- [How Cyber Threat Intelligence Empowers the C-Suite](
- [2024 InformationWeek US IT Salary Report](
- [Generative AI Gifts](
- [Purple AI Datasheet]( [View More White Papers >>]( FEATURED REPORTS - [2024 InformationWeek US IT Salary Report](
- [2023 Global Threat Report](
- [EMA: AI at your fingertips: How Elastic AI Assistant simplifies cybersecurity]( [View More Dark Reading Reports >>]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=124429&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Daily_07.09.24&sp_cid=54185&utm_content=DR_NL_Dark%20Reading%20Daily_07.09.24&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#87
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2024]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)