Threat Intelligence
News & Commentary
Attackers Wrapping New Tools In Old Malware To Target Medical Devices
Jai Vijayan, Freelance writerNews
Hospital equipment running old operating systems providing safe harbor for data theft, TrapX says.
By Jai Vijayan Freelance writer, 6/28/2016
Comment0 comments  |  Read  |  Post a Comment
Google Accounts Of US Military, Journalists Targeted By Russian Attack Group
Sara Peters, Senior Editor at Dark ReadingNews
The Threat Group 4127 that hit the Democratic National Committee also went after 1,800 other targets with info interesting to Russian government, says SecureWorks.
By Sara Peters Senior Editor at Dark Reading, 6/27/2016
Comment0 comments  |  Read  |  Post a Comment
Guccifer 2.0: Red Herring Or Third DNC Hacker?
Jai Vijayan, Freelance writerNews
CrowdStrike and Fidelis say all evidence for intrusions at DNC points to Russian-backed groups.
By Jai Vijayan Freelance writer, 6/21/2016
Comment1 Comment  |  Read  |  Post a Comment
Lone Hacker Taking Credit For DNC Breach Is Likely Russian, Says Researcher
Dark Reading Staff, Quick Hits
'Guccifer 2.0' claimed responsibility for the breach at the Democratic National Committee, then leaked stolen documents about Donald Trump to prove it.
By Dark Reading Staff , 6/17/2016
Comment1 Comment  |  Read  |  Post a Comment
For $6, Buy Access To Hacked Government Server, On Underground Market
Dark Reading Staff, Quick Hits
Kaspersky uncovers marketplace where criminals buy entry into 70,000 servers from 173 countries to launch cyberattacks.
By Dark Reading Staff , 6/16/2016
Comment1 Comment  |  Read  |  Post a Comment
Survey Points To 75% Organizations With Poor Cybersecurity
Dark Reading Staff, Quick Hits
RSA research says nearly half of surveyed companies show their incident response capabilities to be nonexistent.
By Dark Reading Staff , 6/15/2016
Comment0 comments  |  Read  |  Post a Comment
FBI: BEC Scam Attempts Amount to $3 Billion
Dark Reading Staff, Quick Hits
FBI warns of rise in business email compromise frauds, says it should be reported immediately.
By Dark Reading Staff , 6/15/2016
Comment0 comments  |  Read  |  Post a Comment
Russian Hackers Breach Democrats To Steal Data On Trump
Dark Reading Staff, Quick Hits
Washington Post: Government-sponsored group hacked Democratic National Committee to access email, chat traffic, and all 'opposition research' on GOP candidate Donald Trump.
By Dark Reading Staff , 6/14/2016
Comment2 comments  |  Read  |  Post a Comment
Microsoft, Lookout Team Up In Mobile Security
Dark Reading Staff, Quick Hits
Microsoft’s EMS integration with Lookout aim to strengthen customer access policies.
By Dark Reading Staff , 6/7/2016
Comment0 comments  |  Read  |  Post a Comment
FBI IC3 Cautions Against Tech Support Scams
Dark Reading Staff, Quick Hits
Agency says attackers dupe victims into handing over remote device access and thousands of dollars.
By Dark Reading Staff , 6/7/2016
Comment0 comments  |  Read  |  Post a Comment
Top Security To-Dos For The Entertainment Industry
Sara Peters, Senior Editor at Dark ReadingNews
'The biz' has unique security needs. And it isn't only about preventing 'the next Sony.'
By Sara Peters Senior Editor at Dark Reading, 6/6/2016
Comment1 Comment  |  Read  |  Post a Comment
Researchers Demo How To Build Nearly Invisible Backdoor In Computer Chips
Jai Vijayan, Freelance writerNews
Modification almost impossible to catch in post-fab tests says University of Michigan researchers in report that details proof-of-concept attack
By Jai Vijayan Freelance writer, 6/6/2016
Comment2 comments  |  Read  |  Post a Comment
FBI Alerts To Rise In Extortion Email Schemes
Dark Reading Staff, Quick Hits
Fraudsters threaten to release details of high-profile breaches unless paid 2 to 5 bitcoins, says intelligence agency.
By Dark Reading Staff , 6/3/2016
Comment0 comments  |  Read  |  Post a Comment
How Facebook Raises A Generation Of Intelligence Analysts
Gadi Evron, CEO & Founder, Cymmetria, head of Israeli CERT, Chairman, Cyber Threat Intelligence AllianceCommentary
In the process of creating and administering groups, users learn how to read data points, create a risk profile in their head, and watch for changes over time.
By Gadi Evron CEO & Founder, Cymmetria, head of Israeli CERT, Chairman, Cyber Threat Intelligence Alliance, 6/2/2016
Comment0 comments  |  Read  |  Post a Comment
US Federal Reserve Suffered More Than 50 Cyberattacks In 2011-2015
Dark Reading Staff, Quick Hits
A report from the US central bank says 'breaches' between 2011 and 2015 include espionage and hacking.
By Dark Reading Staff , 6/2/2016
Comment0 comments  |  Read  |  Post a Comment
Shades Of Stuxnet Spotted In Newly Found ICS/SCADA Malware
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
'IronGate' discovery underlines the risk of industrial attacks yet to come.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/2/2016
Comment0 comments  |  Read  |  Post a Comment
More Evidence Of Link Between Bank Attacks And North Korean Group
Jai Vijayan, Freelance writerNews
Anomali says it has found five new pieces of malware tying the two attack groups together.
By Jai Vijayan Freelance writer, 6/1/2016
Comment0 comments  |  Read  |  Post a Comment
The Double-Sided Coin Of OPSEC
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Defenders must worry about their own operations security but can also learn a lot from attackers' OPSEC practices.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/1/2016
Comment1 Comment  |  Read  |  Post a Comment
Report: IT Professionals Far Removed From Reality On Security
Dark Reading Staff, Quick Hits
Lumeta research says 90% want to detect cyber incidents that may cause breaches within one day.
By Dark Reading Staff , 6/1/2016
Comment0 comments  |  Read  |  Post a Comment
Pre-Loaded Laptop Software Comes With Security Risks
Rutrell Yasin, Business Technology Writer, Tech Writers BureauNews
Laptops from Dell, HP, Asus, Acer and Lenovo all had at least one vulnerability that could result in complete compromise of system, Duo Security report says.
By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 5/31/2016
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers