Attacks/Breaches
News & Commentary
NASCAR Race Team Learns Ransomware Lesson The Hard Way
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Pays ransom to save $2 million worth of information, warns others of the dangers.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/24/2016
Comment0 comments  |  Read  |  Post a Comment
SEC Sues UK Man For Hacking US Investors' Accounts
Dark Reading Staff, Quick Hits
SEC files case in US court, alleges offender cost victims $289,000 through illegal trades.
By Dark Reading Staff , 6/24/2016
Comment0 comments  |  Read  |  Post a Comment
Large Botnet Comes Back To Life -- With More Malware
Jai Vijayan, Freelance writerNews
The Necurs botnet associated with Dridex and Locky is back after three-week haitus.
By Jai Vijayan Freelance writer, 6/23/2016
Comment0 comments  |  Read  |  Post a Comment
Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
Brett Kelsey, VP & Chief Technology Officer, Americas, Intel Security
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.
By Brett Kelsey VP & Chief Technology Officer, Americas, Intel Security, 6/23/2016
Comment0 comments  |  Read  |  Post a Comment
The Importance Of Taking A More Active Role To Protect Our Data
Josh Thurston, Security Strategist - Americas, Office of the CTO, Intel Security
Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.
By Josh Thurston Security Strategist - Americas, Office of the CTO, Intel Security, 6/23/2016
Comment0 comments  |  Read  |  Post a Comment
Cyber Heist Probe: Bangladesh May End Contract With FireEye
Dark Reading Staff, Quick Hits
Bangladesh Bank reportedly cites high cost as reason for possible termination of agreement.
By Dark Reading Staff , 6/23/2016
Comment0 comments  |  Read  |  Post a Comment
Crypto Ransomware Officially Eclipses Screen-Blocker Ransomware
Jai Vijayan, Freelance writerNews
Encryption malware represented 54 percent of all ransomware in April compared to barely 10 percent a year ago, Kaspersky Lab found.
By Jai Vijayan Freelance writer, 6/22/2016
Comment1 Comment  |  Read  |  Post a Comment
‘Bug Poachers:’ A New Breed of Cybercriminal
Chris Wysopal, CTO, CISO and co-founder, VeracodeCommentary
As if security researchers don’t have enough to worry about, we now have to contend with extortionists who take advantage of the well-established fact that applications are a ripe target for exploitation.
By Chris Wysopal CTO, CISO and co-founder, Veracode, 6/22/2016
Comment0 comments  |  Read  |  Post a Comment
Majority Of SMBs Would Not Pay Ransomware Attackers
Dark Reading Staff, Quick Hits
Study by IDT911 reveals most small- to midsized business owners have no cyber insurance, and lack resources to ward off cyberattacks.
By Dark Reading Staff , 6/22/2016
Comment0 comments  |  Read  |  Post a Comment
Guccifer 2.0: Red Herring Or Third DNC Hacker?
Jai Vijayan, Freelance writerNews
CrowdStrike and Fidelis say all evidence for intrusions at DNC points to Russian-backed groups.
By Jai Vijayan Freelance writer, 6/21/2016
Comment1 Comment  |  Read  |  Post a Comment
Phishing, Whaling & The Surprising Importance Of Privileged Users
Joseph Opacki, VP, Threat Research, PhishLabsCommentary
By bagging a privileged user early on, attackers can move from entry point to mission accomplished in no time at all.
By Joseph Opacki VP, Threat Research, PhishLabs, 6/21/2016
Comment1 Comment  |  Read  |  Post a Comment
GoToMyPC Resets Customer Passwords In Wake Of Attack
Dark Reading Staff, Quick Hits
Citrix says service hit by cyberattack using credential data leaked from earlier breaches of other sites.
By Dark Reading Staff , 6/21/2016
Comment0 comments  |  Read  |  Post a Comment
7 Need-To-Know Attack Stats
Ericka Chickowski, Contributing Writer, Dark Reading
Facts & figures about average dwell times, incident response speeds, and which direction the 'detection deficit' is heading.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/21/2016
Comment2 comments  |  Read  |  Post a Comment
China Still Successfully Hacking US, But Less
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New FireEye report shows significant decline in the number of Chinese cyber espionage attacks on the US since 2014, but China has definitely not stopped the intellectual property theft.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/20/2016
Comment0 comments  |  Read  |  Post a Comment
A Real World Analogy For Patterns of Attack
Ben Johnson, Cofounder & Chief Security Strategist, Carbon Black
Patterns reveal exponentially more relevant information about attempted malfeasance than singular indicators of an attack ever could.
By Ben Johnson Cofounder & Chief Security Strategist, Carbon Black, 6/20/2016
Comment0 comments  |  Read  |  Post a Comment
NATO Officially Declares Cyberspace A Domain For War
Dark Reading Staff, Quick Hits
Cyberattack on a NATO ally will now trigger a collective response.
By Dark Reading Staff , 6/17/2016
Comment1 Comment  |  Read  |  Post a Comment
Lone Hacker Taking Credit For DNC Breach Is Likely Russian, Says Researcher
Dark Reading Staff, Quick Hits
'Guccifer 2.0' claimed responsibility for the breach at the Democratic National Committee, then leaked stolen documents about Donald Trump to prove it.
By Dark Reading Staff , 6/17/2016
Comment1 Comment  |  Read  |  Post a Comment
An Inside Look At The Mitsubishi Outlander Hack
Steve Zurier, Freelance Writer
White hat hacker finds WiFi flaws in mobile app for popular auto; Mitsubishi working on fix.
By Steve Zurier Freelance Writer, 6/17/2016
Comment0 comments  |  Read  |  Post a Comment
Ransomware, SCADA Access As a Service Emerging Threats For ICS Operators, Report Says
Jai Vijayan, Freelance writerNews
With attacks against industrial control networks increasing so too have the challenges, Booz Allen Hamilton says.
By Jai Vijayan Freelance writer, 6/17/2016
Comment0 comments  |  Read  |  Post a Comment
For $6, Buy Access To Hacked Government Server, On Underground Market
Dark Reading Staff, Quick Hits
Kaspersky uncovers marketplace where criminals buy entry into 70,000 servers from 173 countries to launch cyberattacks.
By Dark Reading Staff , 6/16/2016
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by shankarmak
Current Conversations nice post dis
In reply to: Re: Pending Review
Post Your Own Reply
Posted by Sadanandwak
Current Conversations GOOD ONE DIS
In reply to: Re: Pending Review
Post Your Own Reply
Posted by Tracyaustinmak
Current Conversations gerat one
In reply to: Re: Pending Review
Post Your Own Reply
Posted by Cillyaussemak
Current Conversations great one post
In reply to: Re: Merger with Bit9
Post Your Own Reply
Posted by Juliealbeartmak
Current Conversations nice post good
In reply to: Re: Merger with Bit9
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How To Build An Effective Defense Against Ransomware
A compendium of Dark Reading´s best recent coverage of ransomware attacks, as well as best practices for defending your enterprise against them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers