Threat Intelligence
News & Commentary
Millions of Stolen US University Email Credentials for Sale on the Dark Web
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers find booming underground market for stolen and fake email credentials from the 300 largest universities in the US.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/29/2017
Comment2 comments  |  Read  |  Post a Comment
1.4 Billion Data Records Exposed in 2016 Breaches
Dark Reading Staff, Quick Hits
The number of data records breached soared in 2016 over the previous year, with the technology sector facing the brunt of the attacks.
By Dark Reading Staff , 3/28/2017
Comment3 comments  |  Read  |  Post a Comment
Hacking the Business Email Compromise
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
BEC attacks are on the rise, but plain-old spoofing of business executives' email accounts remains more prevalent.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/27/2017
Comment0 comments  |  Read  |  Post a Comment
Data Visualization: Keeping an Eye on Security
Joshua Goldfarb, VP & CTO - Emerging Technologies, FireEyeCommentary
Visualization can be one of the most powerful approaches a security team can use to make sense of vast quantities of data. So why does it end up as an afterthought?
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 3/27/2017
Comment1 Comment  |  Read  |  Post a Comment
Intro to Cyber Insurance: 7 Questions to Ask
Kelly Sheridan, Associate Editor, InformationWeek
Buying a cyber insurance policy can be complex and difficult. Make sure you're asking these questions as you navigate the process.
By Kelly Sheridan Associate Editor, InformationWeek, 3/24/2017
Comment9 comments  |  Read  |  Post a Comment
Prioritizing Threats: Why Most Companies Get It Wrong
Michael A. Davis, CTO of CounterTackCommentary
To stay safer, focus on multiple-threat attack chains rather than on individual threats.
By Michael A. Davis CTO of CounterTack, 3/24/2017
Comment6 comments  |  Read  |  Post a Comment
20 Million Mobile Devices at High Risk of Attack, Study Finds
Steve Zurier, Freelance WriterNews
Meanwhile, a separate report by Google says half of all Android devices didn't install a single security update in 2016.
By Steve Zurier Freelance Writer, 3/23/2017
Comment5 comments  |  Read  |  Post a Comment
Windows 'DoubleAgent' Attack Turns AV Tools into Malware
Jai Vijayan, Freelance writerNews
Zero-day attack exploits a legitimate process in Windows, according to Cybellum; AV vendors downplay threat.
By Jai Vijayan Freelance writer, 3/22/2017
Comment1 Comment  |  Read  |  Post a Comment
Future of the SIEM
Kelly Sheridan, Associate Editor, InformationWeekNews
Current SIEM systems have flaws. Here's how the SIEM's role will change as mobile, cloud, and IoT continue to grow.
By Kelly Sheridan Associate Editor, InformationWeek, 3/22/2017
Comment2 comments  |  Read  |  Post a Comment
New Metasploit Extension Available for Testing IoT Device Security
Jai Vijayan, Freelance writerNews
RFTransceiver extension for the Metasploit Hardware Bridge API will let organizations detect and scan wireless devices operating outside 802.11 spec.
By Jai Vijayan Freelance writer, 3/21/2017
Comment0 comments  |  Read  |  Post a Comment
Report: OilRig' Attacks Expanding Across Industries, Geographies
James Carder, CISO & VP, LogRhythm Labs, LogRhythm, Inc.Commentary
Malware targets Middle Eastern airlines, government, financial industries and critical infrastructure with a simple but powerful backdoor created by infected Excel files attached to phishing emails.
By James Carder CISO & VP, LogRhythm Labs, LogRhythm, Inc., 3/21/2017
Comment0 comments  |  Read  |  Post a Comment
3,000 Industrial Plants Per Year Infected with Malware
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Targeted industrial control systems-themed malware is less prevalent yet persistent, including one variant posing as Siemens PLC firmware that has been in action since 2013, researchers find.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/21/2017
Comment0 comments  |  Read  |  Post a Comment
Getting Beyond the Buzz & Hype of Threat Hunting
Kyle Wilhoit, Senior Security Researcher, DomainToolsCommentary
When harnessed properly, threat hunting can be one of the most useful techniques for finding attackers in your network. But it wont happen overnight.
By Kyle Wilhoit Senior Security Researcher, DomainTools, 3/20/2017
Comment0 comments  |  Read  |  Post a Comment
New Wave of Security Acquisitions Signals Start of Consolidation Trend
Steve Zurier, Freelance Writer
A dozen recent high-profile deals reflect cybersecurity vendors' hopes of expanding their offerings with next-generation technology, ideas, and talent.
By Steve Zurier Freelance Writer, 3/20/2017
Comment0 comments  |  Read  |  Post a Comment
Embrace the Machine & Other Goals for CISOs
Mike Convertino, CISO & VP, Information Security, F5 NetworksCommentary
Here are five ways we can become more effective for our organizations.
By Mike Convertino CISO & VP, Information Security, F5 Networks, 3/17/2017
Comment0 comments  |  Read  |  Post a Comment
Sound Waves Used to Hack Common Data Sensors
Terry Sweeney, Contributing EditorNews
Though the immediate threat to your smartphone or Fitbit is slight, University of Michigan researchers show command-and-control capability with spoofed signaling on a variety of MEMS accelerometers.
By Terry Sweeney Contributing Editor, 3/16/2017
Comment0 comments  |  Read  |  Post a Comment
New 'PetrWrap' Signals Intensified Rivalry Among Ransomware Gangs
Kelly Sheridan, Associate Editor, InformationWeekNews
PetrWrap modifies Petya ransomware so its authors can't control unauthorized use of their malware.
By Kelly Sheridan Associate Editor, InformationWeek, 3/14/2017
Comment0 comments  |  Read  |  Post a Comment
Nigerian Cybercrime Matures, Morphs
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
INTERPOL, security researchers see West Africa cybercrime scene expanding and getting more sophisticated.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/13/2017
Comment1 Comment  |  Read  |  Post a Comment
What Your SecOps Team Can (and Should) Do
Chris Crowley, Independent Consultant at Montance, LLCCommentary
If your organization has all of these pieces in place, congratulations!
By Chris Crowley Independent Consultant at Montance, LLC, 3/13/2017
Comment0 comments  |  Read  |  Post a Comment
This Week On Dark Reading: Events Calendar
Dark Reading Staff, Commentary
How to become a threat hunter, how to build a cybersecurity architecture that actually defends against today's risks, and much more...
By Dark Reading Staff , 3/13/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.