Threat actors are exploiting the vulnerability to drop Web shells and cryptominers, security vendor says. [TechWeb]( Follow Dark Reading:
[RSS](
March 30, 2022 LATEST SECURITY NEWS & COMMENTARY [Log4j Attacks Continue Unabated Against VMware Horizon Servers](
Threat actors are exploiting the vulnerability to drop Web shells and cryptominers, security vendor says.
[Exploring the Intersection of Physical Security and Cybersecurity](
Residential, commercial, and public buildings are getting smarter; fitting them with a network of connected systems allows buildings to regulate their environment, save energy, and be more secure.
[Biden Requests Nearly $11B for Federal Cybersecurity Spending](
The administration's 2023 IT budget for civilian agencies includes $500 million more for CISA.
[Private Equity Firm Led by Mnuchin Acquires Mobile Security Vendor Zimperium](
Liberty Strategic Capital to pay $525 million for mobile security vendor. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS ['Unique Attack Chain' Drops Backdoor in New Phishing Campaign]( A threat group combines the use of steganography, open source tools, and Python scripts to target organizations in France.
[Name That Toon: Sleep Like a Baby]( Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
[6 Reasons Not to Pay Ransomware Attackers]( Paying a ransom might appear to be the best option, but it comes with its own costs. [MORE]( EDITORS' CHOICE [HR Alone Can't Solve the Great Resignation](
Here's how IT teams and decision-makers can step up to support the workforce. Creating a culture of feedback and introducing automation can mitigate burnout, inspire employees, and reduce turnover. LATEST FROM THE EDGE [Precursor Malware is a Early Warning Sign for Ransomware](
Ransomware typically rely on malware downloaders and other delivery mechanisms. Detecting and removing precursor malware improves the odds that a ransomware attack has been blocked. LATEST FROM DR TECHNOLOGY [Understanding Private 5G LANs in the Enterprise](
As the technology matures and costs begin to drop, 5G LAN looks more like a realistic replacement for corporate Wi-Fi networks. Tech Resources - [Improving Operations with AI-Assisted Cybersecurity](
- [Unlocking Human Potential in SOC Teams With AI-Assisted Cybersecurity](
- [Defending Corporate Executives and VIPs from Cyberattacks](
- [Identity Access Management 101](
- [Build a Case for a Password Manager](
- [The Rise of Extended Detection & Response](
- [TIM Whitepaper]( [ACCESS TECH LIBRARY NOW]( - [Protecting Industrial Control Systems from Modern Threats]( A 2021 attack on an industrial control system (ICS) at a water treatment plant in a small town in Florida raised eyebrows and surfaced new fears about the risks these kind of systems face. Unfortunately, many ICS systems are working on ... - [Rethinking Asset Management to Improve Enterprise Security]( One common reason behind many enterprise security breaches is that attackers found a system, application, or device that security teams didn't know they had. Attackers can tamper with these unknown systems to make them look legitimate, and security defenders may ... [MORE WEBINARS]( FEATURED REPORTS - [Rethinking Endpoint Security in a Pandemic and Beyond]( IT security teams are expending the concept of "endpoint security" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple ... - [How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World]( Dark Reading's 2022 Endpoint Security Report examines how IT and cybersecurity professionals are grappling with the impact of pandemic-related changes on endpoint security strategies. The report explores how they are building their endpoint security defenses, and provides insight on what organizations ... [MORE REPORTS]( CURRENT ISSUE
[Rethinking Endpoint Security in a Pandemic and Beyond](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST]( PRODUCTS & RELEASES [CriticalStart Releases Enhanced Capabilities for Microsoft 365 Defender]( [Cyera Launches From Stealth With $60M to Identify, Secure, and Remediate Cloud Data Security Risks](
[MORE PRODUCTS & RELEASES]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:customerservice_informationhub@techweb.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2022]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:customerservice_informationhub@techweb.com)