[TechWeb](?elq_mid=84511&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180427&cid=NL_DR_EDT_DR_daily_20180427&elqTrackId=5cfdbe25f45d4bd0a8547130b26c258c&elq=733f4984f2b64f41ad5cfe01268906f9&elqaid=84511&elqat=1&elqCampaignId=30540)
Follow Dark Reading:
[RSS](
April 27, 2018
Top!Top?elq_mid=84511&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[North Korea Ramps Up 'Operation GhostSecret' Cyber Espionage Campaign](
Critical infrastructure, entertainment, finance, healthcare, telecoms, among recent targets of the Lazarus Group, aka Hidden Cobra.
[How Microsoft, Amazon, Alphabet Are Reshaping Security](
Tech's biggest giants are shifting the cybersecurity landscape as they incorporate security into their products and services.
[US Healthcare Firms Among Dozens Hit in 'Orangeworm' Cyberattack Campaign](
Attackers target healthcare organizations in apparent data theft mission, but could do far more damage, according to Symantec researchers.
[Why Hackers Love Healthcare](
The migration of valuable data to the cloud is piquing the interest of cybercrimimals. But there are ways to fight back.
[MyEtherWallet DNS Attack Offers Opt-In Lessons](
Attackers poisoned BGP route tables to redirect Amazon's Route 53 name servers to their malicious servers.
[New Phishing Attack Targets 550M Email Users Worldwide](
In an attempt to steal financial data, the attack bribes users with coupons in exchange for taking an online quiz.
[Routing Security Gets Boost with New Set of MANRS for IXPs](
The Internet Society debuts a new mutually agreed norms initiative for IXPs. [MORE NEWS & COMMENTARY](
HOT TOPICS
[8 Ways Hackers Monetize Stolen Data](
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
[Threat Actors Turn to Blockchain Infrastructure to Host & Hide Malicious Activity](
.bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says.
[It's Time to Take GitHub Threats Seriously](
There's a good chance your company has projects on the source code management system, but the casual way many developers use GitHub creates security issues. [MORE](
EDITORS' CHOICE
[12 Trends Shaping Identity Management](
As IAM companies try to stretch 'identity context' into all points of the cybersecurity market, identity is becoming 'its own solar system.'
[Name That Toon: Threat Landscape](
We provide the cartoon. You write the caption. Enter to win a $25 Amazon gift card.
Tech Resources
- [Accessing the Future: The Need for Unified Access Management](
- [How Prepared Are CISOs for Cyber Security Breaches?](
- [How to Take Your SIEM To The Next Level With MDR](
- [The Quick Guide To MDR](
- [GDPR Without the Hype](
- [Security Concerns to the Aviation Industry](
- [Terranova's 5-Step ISA Framework](E2%80%99s-5-step-isa-framework/396013?elq_mid=84511&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180427&cid=NL_DR_EDT_DR_daily_20180427&elqTrackId=05a0ea32cf9d4824b80e6279ab717357&elq=733f4984f2b64f41ad5cfe01268906f9&elqaid=84511&elqat=1&elqCampaignId=30540)
[ACCESS TECH LIBRARY NOW](
- [ETL Offload: The First Step in Implementing the Data Warehouse of the Future](
If you are finding that your current data warehouse solution is getting more costly while performance is slowing, then this session is for you.
- [[Cybersecurity Crash Course] Detecting & Mitigating Malware](
In this session, you will hear about the latest types of targeted attacks and what your enterprise can do to stop them.
[MORE WEBINARS](
Partner Perspectives
[Europe and Asia Take on More DDoS Attacks](
While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inception, that trend changed in 2017.
[Cloud Misconceptions Are Pervasive Across Enterprises](
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it.
[IDS & IPS: Two Essential Security Measures](
To protect business networks, one line of security isn't enough.
Middle!Middle?elq_mid=84511&elq_cid=22844169
FEATURED REPORTS
- [2018 State of the Cloud Report](
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
- [[Strategic Security Report] Cloud Security's Changing Landscape](strategic-security-report]-cloud-security's-changing-landscape/393003?elq_mid=84511&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180427&cid=NL_DR_EDT_DR_daily_20180427&elqTrackId=f110b9d1eb3c430e824b8ac831ef9066&elq=733f4984f2b64f41ad5cfe01268906f9&elqaid=84511&elqat=1&elqCampaignId=30540)
The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...
[MORE REPORTS](
CURRENT ISSUE
[How to Cope with the IT Security Skills Shortage](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[70% of Security Pros Think Governments Should Regulate Social Media Data Collection: Venafi Survey](
[Kaspersky Lab DDoS Intelligence Report: Long-lasting Attacks, Amplification Attacks, Old Botnets Make a Comeback](
[Protecting Confidential Information Remains No. 1 Problem for End Users: Wombat Security](
[Calligo & Corent Partner to Automate Cloud Migration, Data Privacy](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](?elq_mid=84511&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180427&cid=NL_DR_EDT_DR_daily_20180427&elqTrackId=6bc41f1998514afb9e8a12905f9abce9&elq=733f4984f2b64f41ad5cfe01268906f9&elqaid=84511&elqat=1&elqCampaignId=30540)
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [cick here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2018]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)