Attacks/Breaches
News & Commentary
Obama Orders Inquiry Into Cyberattacks On Democratic Party Websites
Jai Vijayan, Freelance writerNews
President wants U.S. intelligence to provide report before he leaves office Jan. 20.
By Jai Vijayan Freelance writer, 12/9/2016
Comment0 comments  |  Read  |  Post a Comment
Russian Authorities Make Arrests In Wake Of Central Bank Cyberattack
Dark Reading Staff, Quick Hits
Arrests in the $19-million theft were made in a joint operation by FSB and Interior Ministry, says central bank official.
By Dark Reading Staff , 12/9/2016
Comment0 comments  |  Read  |  Post a Comment
Only 25% Companies Equipped To Handle Data Breaches
Dark Reading Staff, Quick Hits
Research by Tripwire on cybersecurity challenges reveals only 3% organizations outsource security issues to experts.
By Dark Reading Staff , 12/9/2016
Comment0 comments  |  Read  |  Post a Comment
Why Video Game Publishers Must Adopt Enforceable Security Standards
Matthew Cook, Co-founder, Panopticon LaboratoriesCommentary
Video games have been under attack at an unprecedented rate since 2012, with cyber criminals playing an increasingly significant role.
By Matthew Cook Co-founder, Panopticon Laboratories, 12/9/2016
Comment1 Comment  |  Read  |  Post a Comment
Data Theft At ThyssenKrupp Highlights Industrial Espionage Threat
Jai Vijayan, Freelance writerNews
German conglomerate confirms it was a victim of a cyberattack in which intellectual property belonging to some of its businesses was stolen.
By Jai Vijayan Freelance writer, 12/8/2016
Comment0 comments  |  Read  |  Post a Comment
From Carna To Mirai: Recovering From A Lost Opportunity
Bob Rudis & Deral Heiland, Rapid7 Chief Data Scientist & IoT Research LeadCommentary
We had four years to prepare for recent DDoS attacks and failed. How can we learn from our mistakes?
By Bob Rudis & Deral Heiland Rapid7 Chief Data Scientist & IoT Research Lead, 12/8/2016
Comment1 Comment  |  Read  |  Post a Comment
Biometric Technology Is Not A Cure-All For Password Woes
Corey Nachreiner, Chief Technology Officer, WatchGuard TechnologiesCommentary
No single authentication token is infallible. The only real solution is multifactor authentication.
By Corey Nachreiner Chief Technology Officer, WatchGuard Technologies, 12/7/2016
Comment0 comments  |  Read  |  Post a Comment
Dailymotion Advises Password Change After Possible Data Breach
Dark Reading Staff, Quick Hits
Breach not yet confirmed, but LeakedSource says it has compromised IDs of over 87 million Dailymotion users, protected by bcrypt.
By Dark Reading Staff , 12/7/2016
Comment0 comments  |  Read  |  Post a Comment
Hacker Of Celeb Emails Goes To Jail For Five Years
Dark Reading Staff, Quick Hits
Bahamian Alonzo Knowles was sentenced for illegal access of 130 celebrity email accounts and selling their personal information.
By Dark Reading Staff , 12/7/2016
Comment2 comments  |  Read  |  Post a Comment
Pennsylvania State Prosecutor's Office Paid Ransom In 'Avalanche' Ransomware Attack
Dark Reading Staff, Quick Hits
Allegheny County state prosecutor's office paid attackers $1,400 in Bitcoin to free its data.
By Dark Reading Staff , 12/6/2016
Comment0 comments  |  Read  |  Post a Comment
Derivative Suit Against Home Depot For 2014 Data Breach Dismissed
Dark Reading Staff, Quick Hits
Judge says defendants may have been slow to spike up network security, but did not fail to act.
By Dark Reading Staff , 12/6/2016
Comment0 comments  |  Read  |  Post a Comment
Web Gateways: 5 Big Security Challenges
Guy Guzner, CEO and co-founder, FireglassCommentary
Overreliance on Web gateways is putting data, users, customers, organizations, and reputation in harm's way.
By Guy Guzner CEO and co-founder, Fireglass, 12/6/2016
Comment0 comments  |  Read  |  Post a Comment
The 7 Most Sensational Breaches Of 2016
Ericka Chickowski, Contributing Writer, Dark Reading
The biggest hacks, data exposures, and thefts that left companies and government entities reeling.
By Ericka Chickowski Contributing Writer, Dark Reading, 12/6/2016
Comment0 comments  |  Read  |  Post a Comment
Hackers Steal $31 Million From Russia's Central Bank
Dark Reading Staff, Quick Hits
Bank says cybercriminals faked client credentials to break into accounts and attempted to steal 5 billion rubles.
By Dark Reading Staff , 12/5/2016
Comment3 comments  |  Read  |  Post a Comment
Avalanche Cybercrime Platform Takedown Leaves A Lot To Clean Up
Bogdan Botezatu, Senior E-threat Analyst, Bitdefender
Help us wipe out the remaining bots and put an end to Avalanche once and for all.
By Bogdan Botezatu Senior E-threat Analyst, Bitdefender, 12/5/2016
Comment1 Comment  |  Read  |  Post a Comment
Reality Check: Getting Serious About IoT Security
Troy Dearing, Senior Ethical HackerCommentary
The Department of Homeland Security is fully justified in urging security standards for the Internet of Things.
By Troy Dearing Senior Ethical Hacker, 12/5/2016
Comment2 comments  |  Read  |  Post a Comment
The Human Firewall: Why People Are Critical To Email Security
Roland Cloutier, Senior VP, Chief Security Officer, ADPCommentary
Technology is just the beginning; employees must be fully on board with security procedures.
By Roland Cloutier Senior VP, Chief Security Officer, ADP, 12/2/2016
Comment2 comments  |  Read  |  Post a Comment
Organizations In Saudi Arabia Reportedly Hit In Destructive New Shamoon Attacks
Jai Vijayan, Freelance writerNews
Thousands of computers at countrys main civil aviation authority and other entities rendered unusable by same malware that destroyed 30,000 computers at Aramco in 2012.
By Jai Vijayan Freelance writer, 12/1/2016
Comment0 comments  |  Read  |  Post a Comment
Holiday Weekend Online Payment Card Fraud 20% Higher In 2016
Dark Reading Staff, Quick Hits
In the face of EMV chips, criminals turned online to commit card-not-present fraud this Black Friday and Cyber Monday.
By Dark Reading Staff , 12/1/2016
Comment2 comments  |  Read  |  Post a Comment
20 Questions Smart Security Pros Should Ask About 'Intelligence'
Joshua Goldfarb, VP & CTO - Emerging Technologies, FireEyeCommentary
Threat intel is a hot but complicated topic that encompasses a lot more than just data feeds. Here's how to get beyond the fear, uncertainty, and doubt to maximize its potential.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 12/1/2016
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.