informa
/

Advanced Threats

Our Eye Is on the SPARROW
How unauthorized users can exploit wireless infrastructures for covert communication.
September 24, 2021
How unauthorized users can exploit wireless infrastructures for covert communication.
by Reza Soosahabi, Senior R&D Engineer, Keysight Technologies
September 24, 2021
5 min read
Article
Google Spots New Technique to Sneak Malware Past Detection Tools
The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.
September 23, 2021
The operator behind OpenSUpdater is using a new way to sneak adware and other malware past security tools.
by Jai Vijayan, Contributing Writer
September 23, 2021
3 min read
Article
FamousSparrow APT Group Flocks to Hotels, Governments, Businesses
The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.
September 23, 2021
The cyber espionage group has a custom backdoor and has added the ProxyLogon Microsoft Exchange flaw to its toolkit.
by Kelly Sheridan, Senior Editor
September 23, 2021
3 min read
Article
NIST Brings Threat Modeling into the Spotlight
NIST recommendations typically become part of government procurement, which means threat modeling will soon be written i...
September 23, 2021
NIST recommendations typically become part of government procurement, which means threat modeling will soon be written i...
by Adam Shostack, Technical Advisor to IriusRisk
September 23, 2021
5 min read
Article
Midmarket Security: Think You’re Safe? Think Again
Gone is the false perception that large enterprises, banks, and financial institutions are the only organizations under ...
September 22, 2021
Gone is the false perception that large enterprises, banks, and financial institutions are the only organizations under ...
by Tim Liu, Co-founder and CTO at Hillstone Networks
September 22, 2021
5 min read
Article
Why Security Pros Should Rethink Their Focus on Information Resilience
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's abili...
September 22, 2021
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's abili...
by Sounil Yu, CISO and Head of Research of JupiterOne
September 22, 2021
5 min read
Article
5 Ways to Become a Better Cyber-Threat Exterminator
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and im...
September 21, 2021
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and im...
by Mike Wilkes, Chief Information Security Officer at SecurityScorecard
September 21, 2021
5 min read
Article
Why Cryptomining Malware Is a Harbinger of Future Attacks
Crypto thieves rely on users not noticing installation of their tiny payload on thousands of machines, or the CPU cycles...
September 21, 2021
Crypto thieves rely on users not noticing installation of their tiny payload on thousands of machines, or the CPU cycles...
by Ricardo Villadiego, Founder and CEO of Lumu
September 21, 2021
5 min read
Article
Infrastructure, Security, and the Need for Visibility
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
September 17, 2021
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
by Joe Slowik, Senior Manager at Gigamon
September 17, 2021
5 min read
Article
Microsoft Warns of Uptick in MSHTML Attacks
Attackers leveraging the flaw are using infrastructure associated with other criminal groups, including ransomware-as-a-...
September 16, 2021
Attackers leveraging the flaw are using infrastructure associated with other criminal groups, including ransomware-as-a-...
by Jai Vijayan, Contributing Writer
September 16, 2021
4 min read
Article
Cybercriminals See Bountiful Harvest in Food Supply Chain
Agriculture and food companies are seeing increased attacks from ransomware groups targeting the industry, prompting the...
September 08, 2021
Agriculture and food companies are seeing increased attacks from ransomware groups targeting the industry, prompting the...
by Robert Lemos, Contributing Writer
September 08, 2021
4 min read
Article
Email Fraud Scheme Sends Victims to Fake Cryptocurrency Platforms
Malicious emails promise hundreds of thousands of dollars in cryptocurrency to victims and sends credentials to alleged ...
September 08, 2021
Malicious emails promise hundreds of thousands of dollars in cryptocurrency to victims and sends credentials to alleged ...
by Dark Reading Staff, Dark Reading
September 08, 2021
2 min read
Article
Hackers Shut Down a Pipeline. How Should the Energy Sector Respond?
With all eyes on cybersecurity, the energy and utilities industries are adopting zero-trust frameworks. Here are three k...
September 08, 2021
With all eyes on cybersecurity, the energy and utilities industries are adopting zero-trust frameworks. Here are three k...
by Dave Cronin, VP, Cyber Strategy Lead at Capgemini Americas
September 08, 2021
5 min read
Article
Back to School Pivots to Hack the School
Any state with a vibrant economy — and schools — should be considered big targets for ransomware attackers.
September 07, 2021
Any state with a vibrant economy — and schools — should be considered big targets for ransomware attackers.
by Dave Gast, Senior Threat Researcher, Intrusion Inc.
September 07, 2021
4 min read
Article
Ragnar Locker Threatens to Leak Data if Victims Contact Authorities
The ransomware group says it will leak victims' stolen data if they seek help from law enforcement or data encryption ex...
September 07, 2021
The ransomware group says it will leak victims' stolen data if they seek help from law enforcement or data encryption ex...
by Dark Reading Staff, Dark Reading
September 07, 2021
1 min read
Article