News & Commentary

Latest Content tagged with Threat Intelligence
Page 1 / 2   >   >>
Hackers Found Phishing for Facebook Credentials
Quick Hits  |  2/15/2019  | 
A "very realistic-looking" login prompt is designed to capture users' Facebook credentials, researchers report.
Staffing Shortage Makes Vulnerabilities Worse
Quick Hits  |  2/15/2019  | 
Businesses don't have sufficient staff to find vulnerabilities or protect against their exploit, according to a new report by Ponemon Institute.
ICS/SCADA Attackers Up Their Game
News  |  2/15/2019  | 
With attackers operating more aggressively and stealthily, some industrial network operators are working to get a jump on the threats.
Post-Quantum Crypto Standards Arent All About the Math
News  |  2/15/2019  | 
The industry needs to keep in mind the realities of hardware limits and transitional growing pains, according to Microsoft, Utimaco researchers.
From 'O.MG' to NSA, What Hardware Implants Mean for Security
News  |  2/14/2019  | 
A wireless device resembling an Apple USB-Lightning cable that can exploit any system via keyboard interface highlights risks associated with hardware Trojans and insecure supply chains.
Valentine's Emails Laced with Gandcrab Ransomware
News  |  2/14/2019  | 
In the weeks leading up to Valentine's Day 2019, researchers notice a new form of Gandcrab appearing in romance-themed emails.
Coffee Meets Bagel Confirms Hack on Valentine's Day
Quick Hits  |  2/14/2019  | 
The dating app says users' account data may have been obtained by an unauthorized party.
New Professional Development Institute Aims to Combat Cybersecurity Skills Shortage
Quick Hits  |  2/14/2019  | 
The (ISC)2 announces a new institute for working cybersecurity professionals to continue their education.
Diversity Is Vital to Advance Security
Commentary  |  2/14/2019  | 
Meet five female security experts who are helping to propel our industry forward.
How to Create a Dream Team for the New Age of Cybersecurity
Commentary  |  2/14/2019  | 
When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the cracks. Here are five ways to stop them.
Security Spills: 9 Problems Causing the Most Stress
Slideshows  |  2/14/2019  | 
Security practitioners reveal what's causing them the most frustration in their roles.
2018 Was Second-Most Active Year for Data Breaches
News  |  2/13/2019  | 
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.
Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues
News  |  2/13/2019  | 
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers.
Researchers Dig into Microsoft Office Functionality Flaws
News  |  2/13/2019  | 
An ongoing study investigating security bugs in Microsoft Office has so far led to two security patches.
Scammers Fall in Love with Valentine's Day
News  |  2/13/2019  | 
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.
Up to 100,000 Reported Affected in Landmark White Data Breach
News  |  2/12/2019  | 
Australian property valuation firm Landmark White exposed files containing personal data and property valuation details.
Symantec Acquires Luminate to Build on Cloud Security
Quick Hits  |  2/12/2019  | 
Luminate Security, which specializes in software-defined perimeter technology, will extend Symantec's integrated defense platform.
2019 Security Spending Outlook
Slideshows  |  2/12/2019  | 
Cybersecurity and IT risk budgets continue to grow. Here's how they'll be spent.
OkCupid Denies Data Breach Amid Account Hack Complaints
Quick Hits  |  2/11/2019  | 
Users on the dating website report hackers breaking into their accounts, changing email addresses, and resetting passwords.
US Law Enforcement Busts Romanian Online Crime Operation
News  |  2/8/2019  | 
Twelve members of 20-person group extradited to US to face charges related to theft of millions via fake ads other scams.
Malware Campaign Hides Ransomware in Super Mario Wrapper
Quick Hits  |  2/8/2019  | 
A newly discovered malware campaign uses steganography to hide GandCrab in a seemingly innocent Mario image.
We Need More Transparency in Cybersecurity
Commentary  |  2/8/2019  | 
Security has become a stand-alone part of the corporate IT organization. That must stop, and transparency is the way forward.
Cyberattack Hits Australian Parliament
Quick Hits  |  2/8/2019  | 
Officials believe a nation-state is to blame for the incident, which took place Thursday night into Friday morning.
4 Payment Security Trends for 2019
Commentary  |  2/7/2019  | 
Visa's chief risk officer anticipates some positive changes ahead.
Security Bugs in Video Chat Tools Enable Remote Attackers
News  |  2/7/2019  | 
Lifesize is issuing a hotfix to address vulnerabilities in its enterprise collaboration devices, which could give hackers a gateway into target organizations.
DDoS Mitigation Pioneer Launches Network Security Startup
Quick Hits  |  2/7/2019  | 
Barrett Lyon is co-founder of Netography, which emerged today with $2.6M in seed funding from Andreessen Horowitz.
New Chrome Extension Takes Aim at Password Security
News  |  2/6/2019  | 
Google adds 'Password Checkup' feature that alerts users if their online credentials have been compromised.
HelpSystems Buys Core Security Assets to Grow Infosec Portfolio
Quick Hits  |  2/6/2019  | 
Acquisition will enable it to provide threat detection, pen testing, and other security tools to customers.
Google Tackles Gmail Spam with Tensorflow
News  |  2/6/2019  | 
Tensorflow, Google's open-source machine learning framework, has been used to block 100 million spam messages.
4 Practical Questions to Ask Before Investing in AI
Commentary  |  2/6/2019  | 
A pragmatic, risk-based approach can help CISOs plan for an efficient, effective, and economically sound implementation of AI for cybersecurity.
7 Tips for Communicating with the Board
Slideshows  |  2/6/2019  | 
The key? Rather than getting bogged down in the technical details, focus on how a security program is addressing business risk.
Shellbot Crimeware Re-Emerges in Monero Mining Campaign
News  |  2/5/2019  | 
New attack uses a repurposed version of the Trojan that spreads using Internet Relay Chat.
Over 59K Data Breaches Reported in EU Under GDPR
Quick Hits  |  2/5/2019  | 
In addition, 91 reported fines have been imposed since the regulation went into effect last May.
Exposed Consumer Data Skyrocketed 126% in 2018
News  |  2/4/2019  | 
The number of data breaches dropped overall, but the amount of sensitive records exposed jumped to 446.5 million last year, according to the ITRC.
6 Security Tips Before You Put a Digital Assistant to Work
Slideshows  |  2/4/2019  | 
If you absolutely have to have Amazon Alexa or Google Assistant in your home, heed the following advice.
Researchers Devise New Method of Intrusion Deception for SDN
News  |  2/4/2019  | 
Team from University of Missouri take wraps off Dolus, a system defense using pretense which they say will help defend software-defined networking (SDN) cloud infrastructure.
How Hackers Could Hit Super Bowl LIII
News  |  2/1/2019  | 
Security threats and concerns abound for the year's biggest football game. What officials and fans can do about it.
KISS, Cyber & the Humble but Nourishing Chickpea
Commentary  |  2/1/2019  | 
The combination of simple, straightforward, and methodical ingredients are the keys to developing a balanced and well-rounded security program.
Dell, CrowdStrike, Secureworks Join Forces to Secure Endpoints
News  |  1/31/2019  | 
Dell SafeGuard and Response is geared toward businesses, governments, and schools that may lack resources they need to detect and remediate sophisticated threats.
For a Super Security Playbook, Take a Page from Football
Commentary  |  1/31/2019  | 
Four key questions to consider as you plan out your next winning security strategy.
Rubrik Data Leak is Another Cloud Misconfiguration Horror Story
News  |  1/30/2019  | 
A server security mishap exposed vast stores of data belonging to clients of Rubrik, a security and cloud management firm.
Open Source & Machine Learning: A Dynamic Duo
Commentary  |  1/30/2019  | 
In recent months, machine-learning code has become readily available in the open source community, putting security analysts on a path toward easier data pattern recognition.
Americans Worried More About Computer - Not Border - Security
Quick Hits  |  1/29/2019  | 
A new survey shows more Americans are more concerned about their computer's security than the US border's.
Symantec Rolls Out New Endpoint Security Tools, Updates
Quick Hits  |  1/29/2019  | 
Today's releases include more advanced EDR tools, a new managed EDR service, and protection and hardening for Symantec's endpoint portfolio.
Ukraine Sees Surge in Election-Targeted Cyberattacks
Quick Hits  |  1/25/2019  | 
The nation suspects Russia's hand in the attacks, which seem aimed at disrupting the upcoming presidential election.
Credential Compromises By the Numbers
Slideshows  |  1/25/2019  | 
Recent statistics show just how much credential stealing has become a staple in the attacker playbook.
Cyberattackers Bait Financial Firms with Google Cloud Platform
News  |  1/24/2019  | 
A new wave of attacks abuses the Google Cloud Platform URL redirection in PDF decoys, sending users to a malicious link.
Cloud Customers Faced 681M Cyberattacks in 2018
Quick Hits  |  1/24/2019  | 
The most common attacks involved software vulnerabilities, stolen credentials, Web applications, and IoT devices.
Enterprise Malware Detections Up 79% as Attackers Refocus
News  |  1/23/2019  | 
A new report on the state of malware shows a spike in B2B malware, with former banking Trojans Emotet and TrickBot topping the list.
VC Investments in Cybersecurity Hit Record Highs in 2018
News  |  1/18/2019  | 
But rate of funding appears unsustainable, according to Strategic Cyber Ventures.
Page 1 / 2   >   >>


Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3812
PUBLISHED: 2019-02-19
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
CVE-2019-8933
PUBLISHED: 2019-02-19
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on ...
CVE-2019-7629
PUBLISHED: 2019-02-18
Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
CVE-2019-8919
PUBLISHED: 2019-02-18
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2019-8917
PUBLISHED: 2019-02-18
SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may b...