Newsletter Subject

Attackers Already Exploiting Flaws in Microsoft's July Security Update

From

ubm.com

Email Address

darkreading@am.amtechwebresources.com

Sent On

Wed, Jul 10, 2024 01:06 PM

Email Preheader Text

In all, the company released fixes for a whopping 139 CVEs in its own products and four for non-Micr

In all, the company released fixes for a whopping 139 CVEs in its own products and four for non-Microsoft products. [TechWeb]( Follow Dark Reading: [RSS]( July 10, 2024 LATEST SECURITY NEWS & COMMENTARY [Attackers Already Exploiting Flaws in Microsoft's July Security Update]( In all, the company released fixes for a whopping 139 CVEs in its own products and four for non-Microsoft products. [Chinese Threat Group APT40 Exploits N-Day Vulns at Rapid Pace]( The state-sponsored threat group is capable of exploiting fresh software vulnerabilities within hours of their initial discovery. [Google Targets Passkey Support to High-Risk Execs, Civil Society]( The tech giant has rolled out passkey support for account authentication within its Advanced Protection Program to complement existing compatibility with FIDO2 hardware keys. [Eldorado Ransomware Cruises Onto the Scene to Target VMware ESXi]( The ransomware-as-a-service platform just rolled off the assembly line, also targets Windows, and uses Golang for cross-platform capabilities. [Evolve Bank & Trust Reveals 7M Impacted in LockBit Breach]( Though the company reassures its users that customer funds were not accessed, the same cannot be said for customer information. [Trojanized jQuery Packages Spread via 'Complex' Supply Chain Attack]( The campaign, which distributes dozens of malicious jQuery variants across npm, GitHub, and jsDelivr, appears to be a manual effort, and lacks the typical pattern that characterizes similar, related attacks. [CISA Takedown of Ivanti Systems Is a Wake-up Call]( The exploitation of vulnerabilities in Ivanti's software underscores the need for robust cybersecurity measures and proactive response strategies to mitigate risks and protect critical assets. [(Sponsored Article) How the CISO Can Transform Into a True Cyber Hero]( Three steps that can help CISOs bring calm to incident response, redefine how they are perceived, and emerge as the hero in a cyber crisis. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS Reading Confidential: Meet the Ransomware Negotiators]( Episode 2: Incident response experts-turned-ransomware negotiators Ed Dubrovsky, COO and managing partner of CYPFER, and Joe Tarraf, chief delivery officer of Surefire Cyber, explain how they interact with cyber threat actors who hold victim organizations' systems and data for ransom. [Cyber-Insurance Prices Plummet as Market Competition Grows]( Now may be a good time to find good deals on insurance coverage for ransomware and security incidents. [Deconstructing Security Assumptions to Ensure Future Resilience]( By breaking down fundamental assumptions, we can proactively plan for, and begin to achieve, future resilience. ['CloudSorcerer' Leverages Cloud Services in Cyber-Espionage Campaign]( The newly discovered APT's main weapon is a malware tool that can change behavior depending on the process in which it is running. [MORE]( PRODUCTS & RELEASES [2024 SANS SOC Survey Reveals Critical Trends and Technologies in Cyber Defense]( [Global Quantum Computing Market Expected to Reach $7.13B By 2031 As Data Protection Needs Increase]( [Implementing Zero Trust and Mitigating Risk: ISC2 Courses to Support Your Development]( [MORE PRODUCTS & RELEASES]( EDITORS' CHOICE [Apple Geolocation API Exposes Wi-Fi Access Points Worldwide]( Beyond the devices that use them, Wi-Fi hubs themselves can leak interesting data, thanks to some quirks in Apple's geolocation system. LATEST FROM THE EDGE [5 Tips to Minimize the Costly Effects of Data Exfiltration]( The more sensitive data an organization collects, the more at risk it is to a cyberattack. Here's how to limit the damage. LATEST FROM DR TECHNOLOGY [Cloud-Based Investigations Platform Targets Complexity in Incident Response]( Software-as-a-service company Command Zero launches with a platform for investigating cybersecurity incidents that aims to minimize the grunt work. LATEST FROM DR GLOBAL [Houthi-Aligned APT Targets Mideast Militaries With 'GuardZoo' Spyware]( Simple malware and simple TTPs play against a backdrop of complex geopolitical conflict in the Arab world. WEBINARS - [The CIOs Guide to Enhancing GRC in 2024]( When structured correctly, Governance, Risk, and Compliance (GRC) can enable enterprises to align IT and business goals, while mitigating risks and abiding by industry and government requirements. Effectively manage your resources and unify your enterprise by utilizing emerging technology that ... - [Smart Service Management]( Attend this webinar to get real-life examples of how teams are expediting response time, decreasing team drain, and increasing self-service adoption. [View More Dark Reading Webinars >>]( WHITE PAPERS - [Decode the New SEC Cybersecurity Disclosure Ruling]( - [Threat Hunting's Evolution:From On-Premises to the Cloud]( - [The Three-Point Action Plan for new CISOs]( - [Data Protection Essentials: Proactive PII Leak Prevention and Data Mapping for GDPR]( - [How Cyber Threat Intelligence Empowers the C-Suite]( - [Generative AI Gifts]( - [SecOps Checklist]( [View More White Papers >>]( FEATURED REPORTS - [2024 InformationWeek US IT Salary Report]( - [Elastic named a Leader in The Forrester Wave™: Security Analytics Platforms, Q4 2022]( - [2023 Global Threat Report]( [View More Dark Reading Reports >>]( Dark Reading Daily -- Published By [Dark Reading]( Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.]( Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com) Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=124444&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Daily_07.10.24&sp_cid=54201&utm_content=DR_NL_Dark%20Reading%20Daily_07.10.24&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#ac If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2024]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)

Marketing emails from ubm.com

View More
Sent On

06/12/2024

Sent On

05/12/2024

Sent On

05/12/2024

Sent On

09/11/2024

Sent On

08/11/2024

Sent On

07/11/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.