Threat Intelligence

News & Commentary
Cloud Security: Lessons Learned from Intrusion Prevention Systems
Gunter Ollmann, CTO, Security, Microsoft Cloud and AI Division   Commentary
The advancement of AI-driven public cloud technology is changing the game of "protection by default" in the enterprise.
By Gunter Ollmann CTO, Security, Microsoft Cloud and AI Division , 7/17/2018
Comment0 comments  |  Read  |  Post a Comment
7 Nigerians Indicted for Fraud Operation on Dating Sites
Dark Reading Staff, Quick Hits
Con artists have been charged with operating a scheme that cost users of American dating websites more than $1.5 million.
By Dark Reading Staff , 7/17/2018
Comment0 comments  |  Read  |  Post a Comment
Less Than Half of Cyberattacks Detected via Antivirus: SANS
Kelly Sheridan, Staff Editor, Dark ReadingNews
Companies are buying next-gen antivirus and fileless attack detection tools but few have the resources to use them, researchers report.
By Kelly Sheridan Staff Editor, Dark Reading, 7/16/2018
Comment0 comments  |  Read  |  Post a Comment
Trump Dismisses Russian Interference Indictments in Presser with Putin
Dark Reading Staff, Quick Hits
Russian President Vladamir Putin 'just said it's not Russia,' US President Trump said.
By Dark Reading Staff , 7/16/2018
Comment1 Comment  |  Read  |  Post a Comment
India Telecom Regulator: Users Have Primary Data Rights
Dark Reading Staff, Quick Hits
Organizations 'should be restrained from using metadata to identify individual users,' says the Telecom Regulatory Authority of India.
By Dark Reading Staff , 7/16/2018
Comment1 Comment  |  Read  |  Post a Comment
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
GRU hackers used bitcoin to fund US computer network infrastructure supporting and hiding the operation.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/13/2018
Comment2 comments  |  Read  |  Post a Comment
8 Big Processor Vulnerabilities in 2018
Ericka Chickowski, Contributing Writer, Dark Reading
Security researchers have been working in overdrive examining processors for issues and they haven't come up empty-handed.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/13/2018
Comment1 Comment  |  Read  |  Post a Comment
Congressional Report Cites States Most Vulnerable to Election Hacking
Dark Reading Staff, Quick Hits
A new report details issues with 18 states along with suggestions on what can be done.
By Dark Reading Staff , 7/13/2018
Comment0 comments  |  Read  |  Post a Comment
FBI: Email Account Compromise Losses Reach $12B
Dark Reading Staff, Quick Hits
There were more than 78K business email account (BEC) and email account compromise (EAC) scam incidents worldwide between October 2013 and May 2018.
By Dark Reading Staff , 7/13/2018
Comment0 comments  |  Read  |  Post a Comment
How to Structure an Enterprise-Wide Threat Intelligence Strategy
Tom Badders, Senior Product Manager, Secure Mobility, at Telos CorporationCommentary
To keep an organization safe, you must think about the entire IT ecosystem.
By Tom Badders Senior Product Manager, Secure Mobility, at Telos Corporation, 7/13/2018
Comment0 comments  |  Read  |  Post a Comment
SOCs Use Automation to Compensate for Training, Technology Issues
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Executives and front-line SOC teams see human and technology issues in much different ways, according to two new reports.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/13/2018
Comment0 comments  |  Read  |  Post a Comment
Critical Vulns Earn $2K Amid Rise of Bug Bounty Programs
Kelly Sheridan, Staff Editor, Dark ReadingNews
As of June, a total of $31 million has been awarded to security researchers for this year already a big jump from the $11.7 million awarded for the entire 2017.
By Kelly Sheridan Staff Editor, Dark Reading, 7/11/2018
Comment0 comments  |  Read  |  Post a Comment
This Is How Much a 'Mega Breach' Really Costs
Kelly Sheridan, Staff Editor, Dark ReadingNews
The average cost of a data breach is $3.86 million, but breaches affecting more than 1 million records are far more expensive.
By Kelly Sheridan Staff Editor, Dark Reading, 7/11/2018
Comment0 comments  |  Read  |  Post a Comment
New Cyber Center Opens at Augusta University in Georgia
Dark Reading Staff, Quick Hits
University partners with state on $100 million Georgia Cyber Center for cybersecurity education and research.
By Dark Reading Staff , 7/11/2018
Comment0 comments  |  Read  |  Post a Comment
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers from the McAfee Advanced Threat Research team began with an open search on Russian RDP shop UAS to make their discovery.
By Kelly Sheridan Staff Editor, Dark Reading, 7/11/2018
Comment2 comments  |  Read  |  Post a Comment
Asian APT Groups Most Active in Q2
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers at Kaspersky Lab published data on the most prolific threat groups and campaigns, compiled from private intelligence reports developed this quarter.
By Kelly Sheridan Staff Editor, Dark Reading, 7/10/2018
Comment0 comments  |  Read  |  Post a Comment
Businesses Struggle to Build 'Security-First' Culture
Kelly Sheridan, Staff Editor, Dark ReadingNews
New Accenture study finds half of businesses provide cybersecurity training for new hires and only 40% of CISOs prioritize building or expanding insider threat programs.
By Kelly Sheridan Staff Editor, Dark Reading, 7/10/2018
Comment1 Comment  |  Read  |  Post a Comment
AT&T to Buy AlienVault
Dark Reading Staff, Quick Hits
7 Ways to Keep DNS Safe
Curtis Franklin Jr., Senior Editor at Dark Reading
A DNS attack can have an outsize impact on the targeted organization or organizations. Here's how to make hackers' lives much more difficult.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/10/2018
Comment2 comments  |  Read  |  Post a Comment
Two More Convicted in $30M Massive Hacking, Securities Fraud Operation
Kelly Sheridan, Staff Editor, Dark ReadingNews
A former hedge fund manager and securities trader participated in a scheme that made $30 million by trading on information from stolen press releases.
By Kelly Sheridan Staff Editor, Dark Reading, 7/9/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  7/11/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Cyberspace is much less secure than my old lamp.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14363
PUBLISHED: 2018-07-17
An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.
CVE-2018-14349
PUBLISHED: 2018-07-17
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.
CVE-2018-14350
PUBLISHED: 2018-07-17
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.
CVE-2018-14351
PUBLISHED: 2018-07-17
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.
CVE-2018-14352
PUBLISHED: 2018-07-17
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.