Attacks/Breaches
News & Commentary
Yahoo Breach Could Delay $4.8 Billion Verizon Takeover
Dark Reading Staff, Quick Hits
Verizon may revisit contract with Yahoo on doubts of vulnerabilities in the system after 500 accounts were found hacked.
By Dark Reading Staff , 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
What The WADA Hack Proves About Today's Threat Landscape
Gary Newe, Director of Systems Engineering, F5 NetworksCommentary
Fancy Bear's initial release of data on four top American athletes reminds us all to reassess our risks.
By Gary Newe , 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
Adware Campaign Using Advanced Nation-State Obfuscation Techniques
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New report from Carbon Black shows adware may be spreading ransomware, using similar tactics as Operation Aurora.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
Spam Levels Spike, Thanks In Part To Ransomware
Sara Peters, Senior Editor at Dark ReadingNews
By shipping banking Trojans and ransomware that turn big profits fast, spammers can now afford the high overhead of high-volume spam campaigns.
By Sara Peters Senior Editor at Dark Reading, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
Top Democrats Tell Putin To Halt Hacking Of US Political Parties
Dark Reading Staff, Quick Hits
Russia trying to influence November presidential elections, say Senator Dianne Feinstein and Rep. Adam Schiff.
By Dark Reading Staff , 9/23/2016
Comment7 comments  |  Read  |  Post a Comment
Biometric Skimmers Pose Emerging Threat To ATMs
Jai Vijayan, Freelance writerNews
Even as financial institutions move to shore up ATM security with biometric mechanisms, cybercrooks are busy figuring out ways to beat them.
By Jai Vijayan Freelance writer, 9/22/2016
Comment1 Comment  |  Read  |  Post a Comment
Yahoo Reveals Nation State-Borne Data Breach Affecting A Half-Billion Users
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
But still unconfirmed is whether the newly revealed attack is related to recently dumped Yahoo user credentials in an online cybercrime forum.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/22/2016
Comment9 comments  |  Read  |  Post a Comment
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Will Ackerly, Co-Founder & CTO, VirtruCommentary
Oliver Stones movie shows us that while most of us have nothing to hide, we all have information worth protecting both technically and constitutionally.
By Will Ackerly Co-Founder & CTO, Virtru, 9/22/2016
Comment11 comments  |  Read  |  Post a Comment
10 Ways To Lock Down Third-Party Risk
Steve Zurier, Freelance Writer
Experts share ideas for closing potential security holes that leave organizations open to attack.
By Steve Zurier Freelance Writer, 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
Even A False Positive Can Be Valuable
Mark Clancy, CEO, SoltraCommentary
Sharing information about cyberthreats is important for the financial services industry, even when threats turn out to be not-so-threatening.
By Mark Clancy CEO, Soltra, 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
Majority Of Major Corporations Have User Credentials Stolen And Exposed
Jai Vijayan, Freelance writerNews
Companies in the entertainment and technology sectors are far more exposed than others, Digital Shadows analysis shows.
By Jai Vijayan Freelance writer, 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack
Marc Laliberte, Information Security Threat Analyst, WatchGuard TechnologiesCommentary
This slightly modified model is a practical way to keep attackers out of your systems.
By Marc Laliberte Information Security Threat Analyst, WatchGuard Technologies, 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
Rand Study: Average Data Breach Costs $200K, Not Millions
Terry Sweeney, Contributing EditorNews
Rand taps multiple data sources to calculate that cyber incidents cost firms a scant 0.4% of annual revenues, on average.
By Terry Sweeney Contributing Editor, 9/21/2016
Comment2 comments  |  Read  |  Post a Comment
Education Now Suffers The Most Ransomware Attacks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New data shows ransomware rates worldwide doubling and tripling in past 12 months.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
Zscaler Warns Of New iSpy Commercial Keylogger
Jai Vijayan, Freelance writerNews
Malware steals user data, license keys to popular applications.
By Jai Vijayan Freelance writer, 9/20/2016
Comment0 comments  |  Read  |  Post a Comment
Hacking 'Forward With Weaponized Intelligence
Danelle Au, VP Strategy, SafeBreachCommentary
Instead of hacking back and taking the fight to your adversary, what if your organization hacked forward by unearthing breach scenarios before the hackers do?
By Danelle Au VP Strategy, SafeBreach, 9/20/2016
Comment2 comments  |  Read  |  Post a Comment
2016 On Track To See Over 1 Billion Records Breached
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New report shows first half breach statistics put organizations on pace to beat last year's breach numbers by a wide margin.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/20/2016
Comment0 comments  |  Read  |  Post a Comment
What Smart Cities Can Teach Enterprises About Security
Gary Hayslip, Deputy Director, CISO, City of San DiegoCommentary
The more you simplify your security program while still being effective, the better, says San Diegos chief information security officer. Heres his three-step process.
By Gary Hayslip Deputy Director, CISO, City of San Diego, 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
Top Colleges For Cybersecurity
Ericka Chickowski, Contributing Writer, Dark Reading
Check out these respected post-secondary U.S. cybersecurity education programs at both undergraduate and graduate levels.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/19/2016
Comment3 comments  |  Read  |  Post a Comment
Whats The Risk? 3 Things To Know About Chatbots & Cybersecurity
Mike Baker, Founder & Principal, Mosaic451Commentary
Interactive message bots are useful and becoming more popular, but they raise serious security issues.
By Mike Baker Founder & Principal, Mosaic451, 9/19/2016
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.