Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

Content posted in December 2019
Operational Technology: Why Old Networks Need to Learn New Tricks
Commentary  |  12/31/2019  | 
Cybercriminals are maximizing their opportunity by targeting older vulnerabilities in OT environments. It's time to fight back.
Fraud in the New Decade
Commentary  |  12/30/2019  | 
Like any enterprise that wants to survive, fraudsters and hackers will continue to build on past successes to fuel future growth
Mac Malware Breaks Into Top 5 Threats of 2019 – Malwarebytes Labs
Larry Loeb  |  12/30/2019  | 
Of the top 25 detections across all platforms, six were Mac threats, the researchers discovered.
As Hackers Target Mobile Payment Apps, Here's How to Keep Them at Bay
Commentary  |  12/27/2019  | 
A little vigilance helps retailers reduce and prevent three of the most common kinds of mobile app fraud
'Honoring' CCPA's Binding Principles Nationally Won't Be Easy
Commentary  |  12/26/2019  | 
Even companies with the reach, capital, and innovative capacity of Microsoft or Google will struggle to adhere to the tenets of California's new consumer privacy law.
New Botnet Uses DHT as Its Foundation
Larry Loeb  |  12/24/2019  | 
Security researchers at 360 Netlab have been watching a new botnet they call Mozi for the last four months. It's a new P2P botnet with implementation that is based on the Distributed Hash Table protocol.
The Night Before 'Breachmas'
Commentary  |  12/24/2019  | 
What does identity management have to do with Charles Dickens' classic 'A Christmas Carol'? A lot more than you think.
5G Security Rests on an Unstable Base
Larry Loeb  |  12/23/2019  | 
Positive Technologies has issued a report on the emerging security problems of 5G signaling networks.
2020 & Beyond: The Evolution of Cybersecurity
Commentary  |  12/23/2019  | 
As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.
Crystal Ball: The Top 3 Global Cybersecurity Threats for 2020
Steve Durbin  |  12/23/2019  | 
In the year ahead, organizations of all sizes must prepare for the unknown so they have the flexibility to withstand unexpected, high-impact cybersecurity events.
Happier Holidays as Ad Threat Declines
Larry Loeb  |  12/20/2019  | 
DEVCON report finds that the number of ad-threat JavaScript attacks in the US diminished year-over-year, but what attacks there were increased in sophistication.
Ambiguity Around CCPA Will Lead to a Slow Start in 2020
Commentary  |  12/20/2019  | 
But longer term, compliance to California's new privacy law represents an opportunity for companies to increase customer trust and market share.
Patch Management: How to Prioritize an Underserved Vulnerability
Commentary  |  12/19/2019  | 
Why is one of the biggest problems in cybersecurity also one that CISOs largely ignore? Here are three reasons and a road map to a modern approach.
How a Password-Free World Could Have Prevented the Biggest Breaches of 2019
Commentary  |  12/19/2019  | 
If history has taught us anything, it's that hackers can (and will) compromise passwords. Innovation in authentication technology is poised to change that in the coming year.
RST Gets Fixed
Larry Loeb  |  12/18/2019  | 
Peleg Hadar of SaveBreach Labs has posted about the vulnerability he found in Intel's Rapid Storage Technology Service.
5 Security Resolutions to Prevent a Ransomware Attack in 2020
Commentary  |  12/18/2019  | 
Proactively consider tools to detect anomalous behavior, automatically remediate, and segment threats from moving across the network.
Your First Month as a CISO: Forming an Information Security Program
Commentary  |  12/18/2019  | 
It's easy to get overwhelmed in your new position, but these tips and resources will help you get started.
Talking to the Board about Cybersecurity
Commentary  |  12/17/2019  | 
A chief financial officer shares five winning strategies for an effective board-level conversation about right-sizing risk.
Don't Make Security Training a 'One-and-Done'
Commentary  |  12/17/2019  | 
How to move beyond one-off campaigns and build a true security awareness program.
TrickBot Drops an Anchor
Larry Loeb  |  12/17/2019  | 
New threat has been used in campaigns against financial, manufacturing, and retail businesses across the US and Europe.
With Plundervolt, an Intel Processor's Secure Enclave Is No Longer Secure
Larry Loeb  |  12/16/2019  | 
Major hardware vulnerability can allow the changing of information that is supposedly stored as secure in the chips Secure Enclave.
Why Enterprises Buy Cybersecurity 'Ferraris'
Commentary  |  12/16/2019  | 
You wouldn't purchase an expensive sports car if you couldn't use it properly. So, why make a pricey security investment before knowing it fits into your ecosystem?
Endpoint Protection: Dark Reading Caption Contest Winners
Commentary  |  12/13/2019  | 
Trojans, knights, and medieval wordplay. And the winners are ...
Get Organized Like a Villain
Commentary  |  12/12/2019  | 
What cybercrime group FIN7 can teach us about using agile frameworks.
Waking Up to Third-Party Security Risk
Commentary  |  12/12/2019  | 
You can't rely on the words, intentions, or security measures of others to guard your company, customer and brand.
Hardware Is the New Attack Surface – Forrester
Larry Loeb  |  12/12/2019  | 
Attackers have already begun to breach security at the BIOS level, according to a new report on BIOS security from Forrester Consulting.
5 Tips for Keeping Your Security Team on Target
Commentary  |  12/11/2019  | 
In nearly every security environment, competing priorities are a constant battleground. Here's how to keep the focus on what's important.
Big Changes Are Coming to Security Analytics & Operations
Commentary  |  12/11/2019  | 
New ESG research points to fundamental problems, a need for scalable security data pipelines, and a migration to the public cloud.
Snatch Is Both Novel & Evil
Larry Loeb  |  12/11/2019  | 
The Sophos Managed Threat Response team found out that, where the Snatch ransomware is concerned, things just more ugly.
Intel's CPU Flaws Continue to Create Problems for the Tech Community
Commentary  |  12/10/2019  | 
We can't wait out this problem and hope that it goes away. We must be proactive.
Deliver a Deadly Counterpunch to Ransomware Attacks: 4 Steps
Commentary  |  12/10/2019  | 
You can't prevent all ransomware attacks. However, it's possible to ensure that if a breach happens, it doesn't spread, affect business, and become a newsworthy event.
FBI's Portland Office Spies IoT Education Opportunity
Larry Loeb  |  12/10/2019  | 
The Federal Bureau of Investigation's office in Portland, Ore., uses 'Tech Tuesday' to offer IoT security advice.
Maersk CISO Says NotPeyta Devastated Several Unnamed US firms
Commentary  |  12/9/2019  | 
At least two companies may have been dealt even more damage than the shipping giant, which lost nearly its entire global IT infrastructure.
CISA Alerts the Financial Sector About Dridex
Larry Loeb  |  12/9/2019  | 
One of the most prevalent threats to the financial sector, the Dridex Trojan, was the subject of a recent alert.
4 Tips to Run Fast in the Face of Digital Transformation
Commentary  |  12/9/2019  | 
This gridiron-inspired advice will guarantee your digital transformation success and keep your data safe.
Zero-Day Vulnerabilities Discovered in Enterprise-Grade VPN
Larry Loeb  |  12/6/2019  | 
Aviatrix, an enterprise VPN company with customers that include NASA, Shell and BT, has recently dealt with a vulnerability that was uncovered by Immersive Labs researcher and content engineer Alex Seymour.
Success Enablers or Silent Killers?
Commentary  |  12/6/2019  | 
These five success enablers will help CISOs report, measure, and demonstrate ROI to the C-suite.
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Commentary  |  12/5/2019  | 
Assessments can be used against your company in court proceedings. Here's how to mitigate this potential risk.
The Human Factor: 5 Reasons Why Cybersecurity Is a People Problem
Commentary  |  12/5/2019  | 
The industry can only go so far in treating security as a challenge that can be resolved only by engineering.
Europe Starts to Build Its Own Secure Cloud
Oliver Schonschek  |  12/5/2019  | 
The German Federal Government wants to join forces with other European partners to create a secure cloud for Europe called GAIA-X.
Azure OAuth 2.0 Vulnerability Grabs Tokens
Larry Loeb  |  12/5/2019  | 
Security firm CyberArk is now finally able to discuss a major OAuth 2.0 vulnerability that affects Microsoft Azure web services.
Navigating Security in the Cloud
Commentary  |  12/4/2019  | 
Underestimating the security changes that need to accompany a shift to the cloud could be fatal to a business. Here's why.
Application & Infrastructure Risk Management: You've Been Doing It Backward
Commentary  |  12/4/2019  | 
Before getting more scanning tools, think about what's needed to defend your organization's environment and devise a plan to ensure all needed tools can work together productively.
Spear Phishing: Don't Rise to the Bait, Says Microsoft
Larry Loeb  |  12/4/2019  | 
Be alert, be aware, and be careful about what you reveal of your company's internal processes on social media.
What Security Leaders Can Learn from Marketing
Commentary  |  12/3/2019  | 
Employees can no longer be pawns who must be protected all the time. They must become partners in the battle against threats.
Leveraging the Cloud for Cyber Intelligence
Commentary  |  12/3/2019  | 
How fusing output datasets and sharing information can create a real-time understanding of suspicious activity across your enterprise.
ATP Rises to the Polymorphic Malware Challenge
Larry Loeb  |  12/3/2019  | 
The Microsoft Defender ATP Research Team has begun to discuss a polymorphic threat, Dexphot, that it has been tracking for over a year.
3 Modern Myths of Threat Intelligence
Commentary  |  12/2/2019  | 
More intelligence does not lead to more security. Here's why.


News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-25382
PUBLISHED: 2021-04-23
An improper authorization of using debugging command in Secure Folder prior to SMR Oct-2020 Release 1 allows unauthorized access to contents in Secure Folder via debugging command.
CVE-2021-26291
PUBLISHED: 2021-04-23
Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be t...
CVE-2021-31607
PUBLISHED: 2021-04-23
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function...
CVE-2021-31597
PUBLISHED: 2021-04-23
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
CVE-2021-2296
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...