[TechWeb](
Follow Dark Reading:
[RSS](
July 11, 2019
Top!Top?elq_mid=91888&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[7 Hot Cybersecurity Trends to Be Highlighted at Black Hat](
Just some of the research and ideas worth checking out at this year's 'security summer camp.'
[Toyota's Car-Hacking Tool Now Available](
'PASTA' hardware and software kit now retails for $28,300.
[Microsoft Patches Zero-Day Vulnerabilities Under Active Attack](
Microsoft issued fixes for 77 unique vulnerabilities this Patch Tuesday, including two zero-day privilege escalation vulnerabilities seen exploited in the wild.
[Persistent Threats Can Last Inside SMB Networks for Years](
The average dwell time for riskware can be as much as 869 days.
[Britain Looks to Levy Record GDPR Fine Against British Airways](
The penalty is a sign of things to come, say experts.
[New 'WannaHydra' Malware a Triple Threat to Android](
The latest variant of WannaLocker is a banking Trojan, spyware tool, and ransomware.
[20 Questions to Ask During a Real (or Manufactured) Security Crisis](
There are important lessons to be learned from a crisis, even the ones that are more fiction than fact.
[Smash-and-Grab Crime Threatens Enterprise Security](
Getting your company smartphone or laptop stolen from your car isn't just a hassle; it can have large regulatory ramifications, too. Visibility is the answer. [MORE NEWS & COMMENTARY](
Middle!Middle?elq_mid=91888&elq_cid=22844169
HOT TOPICS
[10 Ways to Keep a Rogue RasPi From Wrecking Your Network](
A Raspberry Pi attached to the network at NASA JPL became the doorway for a massive intrusion and subsequent data loss. Here's how to keep the same thing from happening to your network.
[4 Reasons Why SOC Superstars Quit](
Security analysts know they are a hot commodity in the enviable position of writing their own ticket. Here's how to keep them engaged, challenged, and happy.
[Researchers Poke Holes in Siemens Simatic S7 PLCs](
Black Hat USA session will reveal how they reverse-engineered the proprietary cryptographic protocol to attack the popular programmable logic controller. [MORE](
INTRODUCING: THE EDGE
[About The Edge](
Like a Sunday magazine in a daily newspaper, Dark Reading's The Edge offers a variety of value-add content including features, threat data and in-depth perspectives.
[10 Movies All Security Pros Should Watch](
We've broadened our horizons with this great mix of documentaries, hacker movies, and flicks based on short stories.
[Click for more Edge articles.](
Tech Resources
- [7 Reasons You Need Security at the Edge](
- [451 Business Impact Brief: Security for Cloud-Native Compute Will Be Different](
- [Solve the Robo-Calling Plague](
- [State of the Internet: Web Attacks & Gaming Abuse](
- [IDC SpotLight: Protecting Against Threats with Application Security Testing](
- [Emotet Malware Case Study](
- [Security: Santander Case Study](
[ACCESS TECH LIBRARY NOW](
- [The Cost of Industrial Cyber Incidents & How to Prevent Them](
The increasing digital connectivity of industrial networks opens them up to cyber threats, underscoring the importance of protecting not just IT systems, but also operational technology (OT) systems. In this Dark Reading webinar, find out what these risks are and ...
- [Improving Enterprise Authentication: Taming the Password Beast](
In this Dark Reading webinar, a top expert will discuss emerging methods for solving the authentication problem, and for building authentication strategies that go beyond the enterprise premises.
[MORE WEBINARS](
FEATURED REPORTS
- [We Need You: cloud usage & optimization strategies](
We want to know how you strike the balance between the benefits (cost, flexibility and speed) of the cloud with concerns like security and management. Do you have 10 minutes to spare so you can tell us? As a thank you, ...
- [How Enterprises Are Developing Secure Applications](
IT security and application development are disparate processes that are increasingly coming together. Here's a look at how that's happening.
[MORE REPORTS](
CURRENT ISSUE
[Building and Managing an IT Security Operations Program](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Global Cyber Alliance And Center For Internet Security Launch Free Cybersecurity Toolkit for States And Local Election Offices](
[Farsight Security(R) and ThreatSTOP Partner to Introduce ThreatSTOP NOD to Prevent Phishing and Other Risks Associated with New Domains](
[Digital Shadows Raises $10M Strategic Investment Round Led by National Australia Bank Ventures](
[YL Ventures Closes Fourth Fund with $120M of Committed Capital](
[MORE PRODUCTS & RELEASES](
Dark Reading Weekly
-- Published By [InformationWeek](
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2019]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)