Threat Intelligence
News & Commentary
Russia Top Source Of Nefarious Internet Traffic
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Honeypot research from F-Secure shows majority of illicit online activity coming from IP addresses in Russia - also where ransomware is a hot commodity.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/23/2017
Comment1 Comment  |  Read  |  Post a Comment
Survey: Most Attackers Need Less Than 12 Hours To Break In
Jai Vijayan, Freelance writerNews
A Nuix study of DEFCON pen testers shows that the usual security controls are of little use against a determined intruder
By Jai Vijayan Freelance writer, 2/23/2017
Comment0 comments  |  Read  |  Post a Comment
Why We Need To Reinvent How We Catalogue Malware
Paul Shomo,  Technical Manager Strategic Partnerships, Guidance SoftwareCommentary
One obvious trend: crimeware technologies that come with simple user consoles and functionality to create unique binaries at the click of a button.
By Paul Shomo Technical Manager Strategic Partnerships, Guidance Software, 2/22/2017
Comment1 Comment  |  Read  |  Post a Comment
Google Shines Light On Corporate Gmail Threats
Kelly Sheridan, Associate Editor, InformationWeekQuick Hits
New data highlights the diversity of security threats putting corporate Gmail inboxes at risk.
By Kelly Sheridan Associate Editor, InformationWeek, 2/21/2017
Comment2 comments  |  Read  |  Post a Comment
Law Enforcement At RSAC: Collaboration Is Key To Online Crime Fighting
Terry Sweeney, Contributing EditorNews
Agencies and investigators are reaching out across jurisdictions and international borders to vanquish spammers, botnet operators, and worse.
By Terry Sweeney Contributing Editor, 2/21/2017
Comment1 Comment  |  Read  |  Post a Comment
Controlling Privileged Access To Prevent Rogue Users In Active Directory
Derek Melber, Technical Evangelist for ManageEngineCommentary
Knowing which of your employees have which privileges is the first step to staying safe.
By Derek Melber Technical Evangelist for ManageEngine, 2/20/2017
Comment1 Comment  |  Read  |  Post a Comment
Iran Intensifies Its Cyberattack Activity
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Middle East targets namely Saudi Arabia are feeling the brunt of the attacks, but experts anticipate Iran will double down on hacking US targets.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/16/2017
Comment2 comments  |  Read  |  Post a Comment
MEDJACK.3 Poses Advanced Threat To Hospital Devices
Kelly Sheridan, Associate Editor, InformationWeekNews
A newly discovered version of the "medical device hijack" attack targets older operating systems to bypass security measures and steal patient data.
By Kelly Sheridan Associate Editor, InformationWeek, 2/16/2017
Comment0 comments  |  Read  |  Post a Comment
Russian-Speaking Rasputin Breaches Dozens Of Organizations
Jai Vijayan, Freelance writerNews
Attacker behind Election Assistance Commission hack now using SQL injection as his weapon of choice against universities and government agencies.
By Jai Vijayan Freelance writer, 2/15/2017
Comment0 comments  |  Read  |  Post a Comment
What To Do When All Malware Is Zero-Day
Paul Shomo,  Technical Manager Strategic Partnerships, Guidance SoftwareCommentary
The industry needs new methods to fingerprint malware in order to determine who's behind breaches, and what can be done to stop them.
By Paul Shomo Technical Manager Strategic Partnerships, Guidance Software, 2/15/2017
Comment0 comments  |  Read  |  Post a Comment
IoT Security: A Ways To Go, But Some Interim Steps For Safety
Terry Sweeney, Contributing EditorNews
The Internet of Things remains vulnerable to botnets and malware, but Cisco's Anthony Grieco offers some tips to keep networks and users more secure
By Terry Sweeney Contributing Editor, 2/15/2017
Comment0 comments  |  Read  |  Post a Comment
Why Identity Has Become A Top Concern For CSOs
Saryu Nayyar, CEO, GuruculCommentary
Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the fight against cyber adversaries.
By Saryu Nayyar CEO, Gurucul, 2/14/2017
Comment1 Comment  |  Read  |  Post a Comment
Obama's Former Cybersecurity Coordinator Named President Of CTA
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Michael Daniel is now head of the newly incorporated nonprofit Cyber Threat Alliance, a security threat intel-sharing group of major security vendors.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/13/2017
Comment1 Comment  |  Read  |  Post a Comment
IBM Brings Watson Cognitive Computing To The SOC
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Technology known for a Jeopardy stunt six years ago is now powering question answering within IBM Security's QRadar system.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/13/2017
Comment1 Comment  |  Read  |  Post a Comment
New Bug Bounty Program Targets IoT Security
Kelly Sheridan, Associate Editor, InformationWeekNews
GeekPwn bug bounty program aims to collect Internet of Things security vulnerabilities, and highlight mistakes to vendors.
By Kelly Sheridan Associate Editor, InformationWeek, 2/13/2017
Comment0 comments  |  Read  |  Post a Comment
Verizon Data Breach Digest Triangulates Humanity Inside Security
Terry Sweeney, Contributing EditorNews
The 99-page report breaks out 16 different attack scenarios and specifies the target, sophistication level, attributes, and attack patterns, along with their times to discovery and containment.
By Terry Sweeney Contributing Editor, 2/13/2017
Comment4 comments  |  Read  |  Post a Comment
Microsoft Beefs Up Enterprise Security In Windows 10, Surface
Kelly Sheridan, Associate Editor, InformationWeekNews
Microsoft's wave of security news targets hardware, Azure, Office 365, Windows 10, and SQL Server to safeguard business data.
By Kelly Sheridan Associate Editor, InformationWeek, 2/10/2017
Comment0 comments  |  Read  |  Post a Comment
When Hackers Hack Hackers
Ericka Chickowski, Contributing Writer, Dark Reading
Notable cases of internecine cyber squabbles.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/9/2017
Comment2 comments  |  Read  |  Post a Comment
Ex-NSA Contractor Indicted In Alleged Theft Of Classified Data
Dark Reading Staff, Quick Hits
Harold Thomas Martin III, accused of stealing 50 terabytes of highly sensitive government information, will appear in court on Feb. 14.
By Dark Reading Staff , 2/9/2017
Comment0 comments  |  Read  |  Post a Comment
The Promise & Peril Of The App Era
Jason Kent, VP of Product Management, Web Application Security, QualysCommentary
Sure, apps are convenient. But when not properly assessed, they can cause security holes.
By Jason Kent VP of Product Management, Web Application Security, Qualys, 2/7/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by [email protected]
Current Conversations Very interesting data from Google and I'm glad to see new features like S/Mime for gmail. Still prefer client-side but have accepted that most users can't handle the complexity. It's upsetting to see so many still approach...
In reply to: MFA is required security, not additional security
Post Your Own Reply
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our BYOD program is really out of control.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.