[TechWeb](
Follow Dark Reading:
[RSS](
September 10, 2019
LATEST SECURITY NEWS & COMMENTARY
[More Than 99% of Cyberattacks Need Victims' Help](
Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information.
[Public Exposure Does Little to Slow China-Based Thrip APT](
Over the past year, the cyber-espionage group has attacked at least 12 other companies in the military, telecom, and satellite sectors, Symantec says.
[From Spyware to Ninja Cable](
Attackers don't need sophisticated James Bondian hardware to break into your company. Sometimes a $99 device will do.
[Texas Refuses to Pay $2.5M in Massive Ransomware Attack](
The ransomware campaign affected 22 local governments, none of which have paid the attackers' $2.5 million ransom demand.
[New Release Brings BlueKeep to Metasploit](
All organizations with Windows infrastructures should make sure their systems are patched to current versions, Rapid7 suggests. [MORE NEWS & COMMENTARY](
HOT TOPICS
[New Technique Makes Passwords 14M Percent Harder to Crack, Nonprofit Claims](
Tide's method for protecting passwords splinters them up into tiny pieces and stores them on distributed nodes.
[Meet FPGA: The Tiny, Powerful, Hackable Bit of Silicon at the Heart of IoT](
Field-programmable gate arrays are flexible, agile-friendly components that populate many infrastructure and IoT devices - and have recently become the targets of researchers finding vulnerabilities.
[Phishing Campaign Uses SharePoint to Slip Past Defenses](
Cybercriminals targeting financial institutions in the UK bypassed Symantec email gateway and other perimeter technologies. [MORE](
EDITORS' CHOICE
[7 Steps to Web App Security](
Emerging technologies are introducing entirely new ways to reach, act, and interact with people. That makes app security more important than ever.
NEW FROM THE EDGE
[Phishers' Latest Tricks for Reeling in New Victims](
Phishing works because people are, by nature, trusting -- but these evolving phishing techniques make it even tougher for security managers to stay on top.
[Just A Few Questions Before That Bank Withdrawal ...](
And be ready to turn over your first born.
[What Are the First Signs of a Cloud Data Leak?](
Most cloud data breaches leave only trace signs of malfeasance, so it can be tricky.
Tech Resources
- [Hackers & Artificial Intelligence: A Dynamic Duo](
- [2019 State of the Internet/Security: Financial Services Attack Economy](
- [Gartner Report: How to Respond to the 2019 Threat Landscape](
- [What's the Answer to the Vulnerability Overload Problem?](
- [The Fundamental Guide to Building a Better SOC](
- [Demystify Your Cloud Journey](
- [American Heart Association Cloud Case Study](
[ACCESS TECH LIBRARY NOW](
- [Creating and Maintaining Effective Metrics for Assessing Enterprise Security](
In this webinar, top experts will discuss key metrics for assessing security posture, as well as the performance of the security team. You'll learn about some useful ways to measure cybersecurity effectiveness, and how to use those metrics to demonstrate ...
- [10 Incredible Ways to Hack Email & How to Stop the Bad Guys](
[MORE WEBINARS](
FEATURED REPORTS
- [Test Asset Prod](
- [Darktrace Cloud Threat Report](
This report summarizes 11 case studies of cloud-based attacks identified by cyber AI, including spear phishing, insider threat, and zero-day malware.
[MORE REPORTS](
CURRENT ISSUE
[DARK READING TECH DIGEST](
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
Dark Reading examines the research revealed at Black Hat USA and takes a look at some of the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Trustwave Rolls out Cloud-Based Cybersecurity Platform Called Fusion](
[PerimeterX Extends Series C to $57M to Expand Web Application Protection Platform](
[Darktrace Cyber AI Analyst Investigates Threats At Machine Speed](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2019]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)