[TechWeb](
Follow Dark Reading:
[RSS](
June 11, 2020
LATEST SECURITY NEWS & COMMENTARY
[Q&A: Eugene Spafford on the Risks of Internet Voting](
Allowing people to cast their ballots online to circumvent coronavirus-related health concerns introduces problems that we simply don't know how to manage, says the Purdue University professor and security leader.
[Chinese and Iranian APT Groups Targeted US Presidential Campaigns](
Google analysts report advanced persistent threat groups linked to China and Iran launched phishing attacks against the Biden and Trump campaigns.
[Vulnerability in Plug-and-Play Protocol Puts Billions of Devices at Risk](
"CallStranger" flaw in UPnP allows attackers to launch DDoS attacks and scan internal ports, security researcher says.
[When Your Biggest Security and Privacy Threats Come From the Ones You Love](
Research examines the risks and design challenges of accounting for privacy threats in intimate relationships.
[CSO's Guide to 'Employee-First' Security Operations During COVID-19 & Beyond](
As the work-at-home environment continues to inform new ways of doing business, it's important that security teams remain flexible and ready for change.
[What Government Contractors Need to Know About NIST, DFARS Password Reqs](
Organizations that fail to comply with these rules can get hit with backbreaking fines and class-action lawsuits.
[COVID-19: Latest Security News & Commentary](
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic. [MORE NEWS & COMMENTARY](
HOT TOPICS
[Microsoft Fixes 129 Bugs in Largest Patch Tuesday Release](
The June release of security updates addresses several remote code execution vulnerabilities in SharePoint, Excel, Windows OLE, and other services.
[New 'Tycoon' Ransomware Strain Targets Windows, Linux](
Researchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.
[Many Exchange Servers Are Still Vulnerable to Remote Exploit](
A privilege-escalation vulnerability patched in February by Microsoft continues to affect Exchange servers, with more than 80% of Internet-connected servers remaining vulnerable, one firm reports. [MORE](
EDITORS' CHOICE
[A Rogues' Gallery of MacOS Malware](
MacOS isn't immune from malware. Being prepared means understanding the nature of the worst threats a security team is likely to see attacking Macs in the enterprise.
[The Telehealth Attack Surface](
Amid the surge in digital healthcare stemming from the coronavirus pandemic, security is taking a backseat to usability.
NEW FROM THE EDGE
[Asset Management Mess? How to Get Organized](
Hardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure it.
Tech Resources
- [Get The Key to Cloud Success](
- [DDoS Attack Mitigation: Don't Sacrifice Speed for Security](
- [Case Study: Validating Security & Reducing Risk](
- [3 Reasons Why Your Remote Workforce is Vulnerable](
- [Cabinet-Level Electronic Access Control for Data Security and Compliance](
- [Gartner's Solving the Challenges of Modern Remote Access](
- [The State of IT Operations and Cybersecurity Operations 2020](
[ACCESS TECH LIBRARY NOW](
- [Data In Motion & the New Normal](
The winding down of COVID-19 has everyone pondering The New Tomorrow, and no doubt you will be reviewing the state of your current networks and networking plans created previously. This likely means transforming your network architectures and security strategies, which ...
- [Fighting Cybercrime in a Pandemic Threat Landscape](
In this webinar, you will learn about Evidence of Compromise, a new approach to cyber risk management that gives you unprecedented visibility into your entire third-party ecosystem, so you can prioritize active compromises, not hypothetical vulnerabilities.
[MORE WEBINARS](
FEATURED REPORTS
- [State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats](
Download this report to find out what organizations are doing to secure their endpoints and to protect themselves against malware, hackers, and social engineering attacks.
- [Global Cloud Proxy Enables VPN Split Tunneling](
[MORE REPORTS](
CURRENT ISSUE
[How Cybersecurity Incident Response Programs Work (and Why Some Don't)](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[All Mobile Networks Vulnerable to DoS, Impersonation & Fraud Cyberattacks Through GTP Protocol](
[Bishop Fox, Illumio Share Microsegmentation Research Findings](
[HelpSystems Expands Native Virus Protection Software to Include LinuxONE and IBM Z](
[Sophos Advances Endpoint Detection and Response (EDR)](
[MORE PRODUCTS & RELEASES](
Dark Reading Weekly
-- Published By [Dark Reading](
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:customerservice_informationhub@techweb.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2020]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:customerservice_informationhub@techweb.com)