DarkReading Daily.

"Microsoft cloud security woes inspire DHS security review."

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 16 August 2023, 1355 UTC.  Content provided by email subscription to "DarkReading Daily."

Source:  https://mail.google.com/mail/u/0/?tab=rm&ogbl#inbox/FMfcgzGtwggXRVWnvNvQQGvKRGmFNpMR ("DarkReading Daily").

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

LATEST SECURITY NEWS & COMMENTARY
Microsoft Cloud Security Woes Inspire DHS Security Review
Can the government help fix what's wrong in cloud security? An upcoming investigation is going to try.
Patch Now: OpenNMS Bug Steals Data, Triggers Denial of Service
Monitoring platform is trusted by Cisco, Savannah River Nuclear Solutions, and others in CISA's critical infrastructure Sectors, say Synopsys researchers.
AI Steals Passwords by Listening to Keystrokes With Scary Accuracy
The AI model trained on typing recorded over a smartphone was able to steal passwords with 95% accuracy.
3 Major Email Security Standards Prove Too Porous for the Task
Nearly 90% of malicious emails manage to get past SPF, DKIM, or DMARC, since threat actors are apparently using the same filters as legitimate users.
Discord.io Temporarily Shuts Down Amid Breach Investigation
The platform plans to revamp its website code and conduct "a complete overhaul" of its security practices.
How & Why Cybercriminals Fabricate Data Leaks
A closer look at the nature of fake leaks can provide guidance on how to effectively mitigate associated risks.
(Sponsored Article) 3 Mobile or Client-Side Security Myths Debunked
The industry's understanding of mobile or client-side security is too limited, leaving many mobile apps vulnerable. Don't let these three myths lead you astray.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Following Pushback, Zoom Says It Won't Use Customer Data to Train AI Models
Company's experience highlights the tightrope tech organizations walk when integrating AI into their products and services.

5 Ways CISA Can Help Cyber-Poor Small Businesses & Local Governments
Adopting these recommendations will help SMBs and public-sector agencies that must deal with the same questions of network security and data safety as their larger cousins, but without the same resources.

What CISA and NSA Guidance Means for Critical Infrastructure Security
Strategically investing in solutions that meet you where you are makes all the difference in staying secure from cyber threats.

Phishing Operators Make Ready Use of Abandoned Websites for Bait
Abandoned sites — like Wordpress — are easy to break into, offer a legitimate looking cover, and can remain active for longer than average.

MORE
EDITORS' CHOICE
What's New in the NIST Cybersecurity Framework 2.0
Update to the NIST framework adds new "govern" function for cybersecurity.
LATEST FROM THE EDGE

The Hard Realities of Setting AI Risk Policy
It's time to get real about what it takes to set and enforce cybersecurity and resilience standards for AI risk management in the enterprise.
LATEST FROM DR TECHNOLOGY

Mandiant Releases Scanner to Identify Compromised NetScaler ADC, Gateways
Mandiant's IoC Scanner will help enterprises collect indicators of compromise on affected Citrix NetScaler products.
LATEST FROM DR GLOBAL

Bolstering Africa’s Cybersecurity
A thriving economy needs several factors to continue an upward trajectory — but is Africa in a position to enable these factors to take place?
WEBINARS
  • Protecting the Database: How to Secure Your Enterprise Data

    For many enterprises, the "crown jewels" are found in their database applications - virtual "crown jewels" of data in traditional database applications that are often linked to the Internet. What are the chief threats to today's databases? How can you ...

  • Best Practices and Tools for OT and IT Security

    For years, information technology and operations technology systems have existed in parallel, but that is no longer the case. As the attack against Colonial Pipeline illustrated, attacks against IT can potentially impact OT, and vice versa. OT environments have their ...

View More Dark Reading Webinars >>
WHITE PAPERS
View More White Papers >>
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE

The Secrets of Successful SecOps Data Analytics


DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.
© 2023  |  Informa Tech  |  Privacy Statement  |  Terms & Conditions  |  Contact Us

Comments

Popular posts from this blog

The Cyberwire Daily Briefing

BleepingComputer.com

SecurityWeek Briefing