Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

News & Commentary
Securing the Internet of Things in the Age of Quantum Computing
Dr. Charles Grover, Cryptography Researcher, Crypto QuantiqueCommentary
Internet security, privacy, and authentication aren't new issues, but IoT presents unique security challenges.
By Dr. Charles Grover Cryptography Researcher, Crypto Quantique, 5/6/2021
Comment0 comments  |  Read  |  Post a Comment
Stopping the Next SolarWinds Requires Doing Something Different
Tony Cole, CTO at Attivo NetworksCommentary
Will the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale?
By Tony Cole CTO at Attivo Networks, 5/3/2021
Comment2 comments  |  Read  |  Post a Comment
New Threat Group Carrying Out Aggressive Ransomware Campaign
Jai Vijayan, Contributing WriterNews
UNC2447 observed targeting now-patched vulnerability in SonicWall VPN.
By Jai Vijayan Contributing Writer, 4/30/2021
Comment0 comments  |  Read  |  Post a Comment
Attacks Targeting ADFS Token Signing Certificates Could Become Next Big Threat
Jai Vijayan, Contributing WriterNews
New research shows how threat actors can steal and decrypt signing certificates so SAML tokens can be forged.
By Jai Vijayan Contributing Writer, 4/28/2021
Comment0 comments  |  Read  |  Post a Comment
Expect an Increase in Attacks on AI Systems
Robert Lemos, Contributing WriterNews
Companies are quickly adopting machine learning but not focusing on how to verify systems and produce trustworthy results, new report shows.
By Robert Lemos Contributing Writer, 4/27/2021
Comment0 comments  |  Read  |  Post a Comment
US Urges Organizations to Implement MFA, Other Controls to Defend Against Russian Attacks
Jai Vijayan, Contributing WriterNews
Actors working for Moscow's Foreign Intelligence Service are actively targeting organizations in government and other sectors, FBI and DHS say.
By Jai Vijayan Contributing Writer, 4/26/2021
Comment0 comments  |  Read  |  Post a Comment
Improving the Vulnerability Reporting Process With 5 Steps
Bas Alberts, Principal Security Researcher, GitHub Security LabCommentary
Follow these tips for an effective and positive experience for both the maintainer and external vulnerability reporter.
By Bas Alberts Principal Security Researcher, GitHub Security Lab, 4/22/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Greetings, Earthlings
John Klossner, CartoonistCommentary
Caption time! Come up with something out of this world for Dark Reading's latest contest, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 4/22/2021
Comment17 comments  |  Read  |  Post a Comment
Business Email Compromise Costs Businesses More Than Ransomware
Charlie Winckless, Senior Director, Cybersecurity Solutions, at PresidioCommentary
Ransomware gets the headlines, but business paid out $1.8 billion last year to resolve BEC issues, according to an FBI report.
By Charlie Winckless Senior Director, Cybersecurity Solutions, at Presidio, 4/21/2021
Comment0 comments  |  Read  |  Post a Comment
Attackers Heavily Targeting VPN Vulnerabilities
Jai Vijayan, Contributing WriterNews
Threat actors like attacking the technology because they provide a convenient entry point to enterprise networks.
By Jai Vijayan Contributing Writer, 4/21/2021
Comment0 comments  |  Read  |  Post a Comment
Beware the Bug Bounty
Joseph Neumann & Doug Hudson, Cyber Executive Advisor / Senior Director, CoalfireCommentary
In recent months, bug-bounty programs have shifted from mitigating risk to inadvertently creating new liabilities for customers and vendors.
By Joseph Neumann & Doug Hudson Cyber Executive Advisor / Senior Director, Coalfire, 4/20/2021
Comment0 comments  |  Read  |  Post a Comment
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing WriterNews
Treasury Department slaps sanctions on IT security firms that it says supported Russia's Foreign Intelligence Service carry out the attacks.
By Jai Vijayan Contributing Writer, 4/15/2021
Comment0 comments  |  Read  |  Post a Comment
DNS Vulnerabilities Expose Millions of Internet-Connected Devices to Attack
Jai Vijayan, Contributing WriterNews
Researchers uncover a fresh set of nine vulnerabilities in four TCP/IP stacks that are widely used in everything from powerful servers and firewalls to consumer IoT products.
By Jai Vijayan Contributing Writer, 4/13/2021
Comment0 comments  |  Read  |  Post a Comment
Clear & Present Danger: Data Hoarding Undermines Better Security
Elissa M. Redmiles, Researcher, Max Planck Institute for Software SystemsCommentary
Facebook and Google can identify patterns of attack within their own data, but smaller businesses rarely see enough traffic to successfully identify an attack or warn users.
By Elissa M. Redmiles Researcher, Max Planck Institute for Software Systems, 4/13/2021
Comment0 comments  |  Read  |  Post a Comment
New Malware Downloader Spotted in Targeted Campaigns
Jai Vijayan, Contributing WriterNews
Saint Bot is being used to drop stealers on compromised systems but could be used to deliver any malware.
By Jai Vijayan Contributing Writer, 4/12/2021
Comment0 comments  |  Read  |  Post a Comment
Did 4 Major Ransomware Groups Truly Form a Cartel?
Robert Lemos, Contributing WriterNews
An analysis of well-known extortion groups and their cryptocurrency transactions reveals the answer.
By Robert Lemos Contributing Writer, 4/7/2021
Comment1 Comment  |  Read  |  Post a Comment
LinkedIn Phishing Ramps Up With More-Targeted Attacks
Robert Lemos, Contributing WriterNews
Seeking to take advantage of out-of-work users, malware groups continue to use LinkedIn and business services to offer fictional jobs and deliver infections instead.
By Robert Lemos Contributing Writer, 4/5/2021
Comment0 comments  |  Read  |  Post a Comment
7 Security Strategies as Employees Return to the Office
Steve Zurier, Contributing Writer
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal.
By Steve Zurier Contributing Writer, 4/1/2021
Comment0 comments  |  Read  |  Post a Comment
What We Know (and Don't Know) So Far About the 'Supernova' SolarWinds Attack
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A look at the second elusive attack targeting SolarWinds software that researchers at Secureworks recently cited as the handiwork of Chinese nation-state hackers.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/30/2021
Comment1 Comment  |  Read  |  Post a Comment
Ghost Users Haunt Healthcare Firms
Dark Reading Staff, Quick Hits
Data security hygiene severely lacking among healthcare firms, new research shows.
By Dark Reading Staff , 3/30/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by etaymaor
Current Conversations Good read
In reply to: Good read!
Post Your Own Reply
More Conversations
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-06
Primary Source Verification in VerityStream MSOW Solutions before 3.1.1 allows an anonymous internet user to discover Social Security Number (SSN) values via a brute-force attack on a (sometimes hidden) search field, because the last four SSN digits are part of the supported combination of search se...
PUBLISHED: 2021-05-06
Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the "navigation_title" parameter and the "title" parameter in /private/en/pages/add.
PUBLISHED: 2021-05-06
Cross-site request forgery (CSRF) in Fork-CMS before 5.8.2 allow remote attackers to hijack the authentication of logged administrators.
PUBLISHED: 2021-05-06
Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the...
PUBLISHED: 2021-05-06
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gai...