Threat Intelligence
News & Commentary
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Rick Holland of Digital Shadows explains how the attackers' superior business agility, faster change management, specialized job force, lower barriers to entry and bulletproof hosting keeps them ahead of the good guys.
By Sara Peters Senior Editor at Dark Reading, 9/30/2016
Comment0 comments  |  Read  |  Post a Comment
Cybercrime-as-a-Service Offered To Militants, Terrorists, Says Europol
Dark Reading Staff, Quick Hits
The Darknet could provide ample resources and services for terrorists to carry out attacks, claims report.
By Dark Reading Staff , 9/30/2016
Comment1 Comment  |  Read  |  Post a Comment
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
Kelly Sheridan, Associate Editor, InformationWeekNews
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.
By Kelly Sheridan Associate Editor, InformationWeek, 9/29/2016
Comment0 comments  |  Read  |  Post a Comment
Russian Hackers Target Citizen Journalists Reporting On Malaysian Airlines Crash
Jai Vijayan, Freelance writerNews
Bellingcats reporters have been hit with spear phishing attacks and account takeover attempts for over a year, ThreatConnect says.
By Jai Vijayan Freelance writer, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Sharing Cybersecurity Threat Intelligence Is The Only Way We Win
Matthew Rosenquist, Cybersecurity Strategist for Intel
Security organizations must leverage each others information in order to better predict, prevent, detect, and respond to threats their customers and organizations face.
By Matthew Rosenquist Cybersecurity Strategist for Intel, 9/27/2016
Comment1 Comment  |  Read  |  Post a Comment
Even A False Positive Can Be Valuable
Mark Clancy, CEO, SoltraCommentary
Sharing information about cyberthreats is important for the financial services industry, even when threats turn out to be not-so-threatening.
By Mark Clancy CEO, Soltra, 9/22/2016
Comment0 comments  |  Read  |  Post a Comment
Rand Study: Average Data Breach Costs $200K, Not Millions
Terry Sweeney, Contributing EditorNews
Rand taps multiple data sources to calculate that cyber incidents cost firms a scant 0.4% of annual revenues, on average.
By Terry Sweeney Contributing Editor, 9/21/2016
Comment2 comments  |  Read  |  Post a Comment
Rise Of Machine Learning: Advancing Security With ML
Dark Reading Staff, CommentaryVideo
Hal Lonas of Webroot drops by the Dark Reading News Desk at Black Hat.
By Dark Reading Staff , 9/20/2016
Comment0 comments  |  Read  |  Post a Comment
Hacking 'Forward With Weaponized Intelligence
Danelle Au, VP Strategy, SafeBreachCommentary
Instead of hacking back and taking the fight to your adversary, what if your organization hacked forward by unearthing breach scenarios before the hackers do?
By Danelle Au VP Strategy, SafeBreach, 9/20/2016
Comment2 comments  |  Read  |  Post a Comment
What Smart Cities Can Teach Enterprises About Security
Gary Hayslip, Deputy Director, CISO, City of San DiegoCommentary
The more you simplify your security program while still being effective, the better, says San Diegos chief information security officer. Heres his three-step process.
By Gary Hayslip Deputy Director, CISO, City of San Diego, 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
The Future Of AI-Based Cybersecurity: It's Here Now
Dark Reading Staff, CommentaryVideo
Stuart McClure, president and CEO of Cylance, stops by the Dark Reading News Desk at Black Hat.
By Dark Reading Staff , 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
Sports Threat Intelligence-Sharing Group Formed
Steve Zurier, Freelance WriterNews
New information-sharing and analysis organization (ISAO) looks to provide threat intelligence to a broad range of professional and amateur sports organizations.
By Steve Zurier Freelance Writer, 9/15/2016
Comment0 comments  |  Read  |  Post a Comment
France's Online Criminal Underground Built On Foundation Of Distrust
Sara Peters, Senior Editor at Dark ReadingNews
French criminals seeking black market goods and services -- cyber and otherwise -- have to look in darker shadows and work harder to prove their felonious credibility.
By Sara Peters Senior Editor at Dark Reading, 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity In The Obama Era
Rutrell Yasin, Business Technology Writer, Tech Writers Bureau
Our roundup of the Obama administrations major initiatives, executive orders and actions over the past seven and a half years. How would you grade the president's cybersecurity achievements?
By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 9/13/2016
Comment2 comments  |  Read  |  Post a Comment
Lets Get Smarter About Security By Working Together
Rick McElroy, Security Strategist, Carbon Black
We all need help, and only by working together can we move the needle on security.
By Rick McElroy Security Strategist, Carbon Black, 9/13/2016
Comment0 comments  |  Read  |  Post a Comment
New Book Traces Obama Strategy To Protect America From Hackers, Terrorists & Nation States
Wilson Alexander, Writer, Student & AthleteCommentary
A review of Charlie Mitchell's 'Hacked: The Inside Story of Americas Struggle to Secure Cyberspace.'
By Wilson Alexander Writer, Student & Athlete, 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
RSA's Yoran Says Firm's Mission Remains Unchanged In Dell-EMC Merger
Jai Vijayan, Freelance writerNews
RSA remains in full charge of its destiny, RSA president Amit Yoran says.
By Jai Vijayan Freelance writer, 9/8/2016
Comment1 Comment  |  Read  |  Post a Comment
Look The Other Way: DDoS Attacks As Diversions
Dark Reading Staff, CommentaryVideo
Black Hat News Desk talks to Joe Loveless of Neustar.
By Dark Reading Staff , 9/7/2016
Comment0 comments  |  Read  |  Post a Comment
Bad Boys, Whatcha Gonna Do When They Come For You?
Dark Reading Staff, CommentaryVideo
A Black Hat News Desk discussion with Shehzad Merchant of Gigamon.
By Dark Reading Staff , 9/7/2016
Comment0 comments  |  Read  |  Post a Comment
Introducing Deep Learning: Boosting Cybersecurity With An Artificial Brain
Guy Caspi, Deep Instinct Co-Founder & CEOCommentary
With nearly the same speed and precision that the human eye can identify a water bottle, the technology of deep learning is enabling the detection of malicious activity at the point of entry in real-time.
By Guy Caspi Deep Instinct Co-Founder & CEO, 9/6/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.