Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content
Page 1 / 2   >   >>
Why North Korea Excels in Cybercrime
Commentary  |  1/22/2021  | 
North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.
DreamBus, FreakOut Botnets Pose New Threat to Linux Systems
News  |  1/21/2021  | 
Researchers from Zscaler and Check Point describe botnets as designed for DDoS attacks, cryptocurrency mining, and other malicious purposes.
Breach Data Shows Attackers Switched Gears in 2020
News  |  1/21/2021  | 
Attackers focused more on ransomware, while the consolidation of data into large databases led to fewer reported breaches but more records leaked.
Attackers Leave Stolen Credentials Searchable on Google
News  |  1/21/2021  | 
Operators behind a global phishing campaign inadvertently left thousands of stolen credentials accessible via Google Search.
Cloud Jacking: The Bold New World of Enterprise Cybersecurity
Commentary  |  1/21/2021  | 
Increased reliance on cloud computing puts more weight on robust authentication systems to protect data against hijackers.
7 Steps to Secure a WordPress Site
Slideshows  |  1/21/2021  | 
Many companies operate under the assumption that their WordPress sites are secure -- and that couldn't be anything further from the truth.
Rethinking IoT Security: It's Not About the Devices
Commentary  |  1/21/2021  | 
Keeping IoT safe in the future will require securing the networks themselves. Focusing on the devices is a never-ending battle that will only become more burdensome.
Microsoft Releases New Info on SolarWinds Attack Chain
News  |  1/20/2021  | 
Threat actors went to elaborate lengths to maintain operational security around second-stage payload activation, company says.
SolarWinds Attack, Cyber Supply Chain Among Priorities for Biden Administration
News  |  1/20/2021  | 
During Senate confirmation hearings, the nominees for Secretary of Homeland Security and Director of National Intelligence pledged to focus on cybersecurity.
Tips for a Bulletproof War Room Strategy
Commentary  |  1/20/2021  | 
The techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets.
Vulnerabilities in Popular DNS Software Allow Poisoning
News  |  1/19/2021  | 
Seven flaws in DNSMasq have limited impact, but in combination they could be chained to create a multistaged attack.
Microsoft to Launch 'Enforcement Mode' for Zerologon Flaw
Quick Hits  |  1/19/2021  | 
Enforcement mode for the Netlogon Domain Controller will be enabled by default with the Feb. 9 security update.
SolarWinds Attack Underscores 'New Dimension' in Cyber-Espionage Tactics
News  |  1/19/2021  | 
Meanwhile, Malwarebytes is the latest victim, Symantec discovers a fourth piece of malware used in the massive attack campaign, and FireEye Mandiant releases a free tool to help spot signs of the attack.
The Most Pressing Concerns Facing CISOs Today
Commentary  |  1/19/2021  | 
Building security into the software development life cycle creates more visibility, but CISOs still need stay on top of any serious threats on the horizon, even if they are largely unknown.
A Security Practitioner's Guide to Encrypted DNS
Commentary  |  1/19/2021  | 
Best practices for a shifting visibility landscape.
NSA Appoints Rob Joyce as Cyber Director
Quick Hits  |  1/15/2021  | 
Joyce has long worked in US cybersecurity leadership, most recently serving as the NSA's top representative in the UK.
Successful Malware Incidents Rise as Attackers Shift Tactics
News  |  1/15/2021  | 
As employees moved to working from home and on mobile devices, attackers followed them and focused on weekend attacks, a security firm says.
How to Achieve Collaboration Tool Compliance
Commentary  |  1/15/2021  | 
Organizations must fully understand the regulatory guidance on collaboration security and privacy so they can continue to implement and expand their use of tools such as Zoom and Teams.
Shifting Privacy Landscape, Disruptive Technologies Will Test Businesses
News  |  1/14/2021  | 
A new machine learning tool aims to mine privacy policies on behalf of users.
'Chimera' Threat Group Abuses Microsoft & Google Cloud Services
Quick Hits  |  1/14/2021  | 
Researchers detail a new threat group targeting cloud services to achieve goals aligning with Chinese interests.
Businesses Struggle with Cloud Availability as Attackers Take Aim
News  |  1/14/2021  | 
Researchers find organizations struggle with availability for cloud applications as government officials warn of cloud-focused cyberattacks.
NSA Recommends Using Only 'Designated' DNS Resolvers
Quick Hits  |  1/14/2021  | 
Agency provides guidelines on securely deploying DNS over HTTPS, aka DoH.
Who Is Responsible for Protecting Physical Security Systems From Cyberattacks?
News  |  1/14/2021  | 
It's a question that continues to engage debate, as the majority of new physical security devices being installed are now connected to a network. While this offers myriad benefits, it also raises the question: Who is responsible for their cybersecurity?
Vulnerability Management Has a Data Problem
Commentary  |  1/14/2021  | 
Security teams have an abundance of data, but most of it lacks the context necessary to improve remediation outcomes.
SolarWinds Attackers May Have Hit Mimecast, Driving New Concerns
Quick Hits  |  1/13/2021  | 
Mimecast no longer uses the SolarWinds Orion network management software that served as an attack vector for thousands of organizations.
Huntress Acquires EDR Technology From Level Effect
Quick Hits  |  1/13/2021  | 
Huntress seeks to improve its detection and response capabilities with a more comprehensive view of endpoint security.
Virtual Pen-Testing Competition Tasks College Students With Running a Red Team Operation
News  |  1/13/2021  | 
Aimed at developing offensive cyber talent, last weekend's sixth annual Collegiate Penetration Testing Competition brought out some of the brightest from RIT and Stanford, among other universities.
The Data-Centric Path to Zero Trust
Commentary  |  1/13/2021  | 
Data is an organization's most valuable asset, so a data-centric approach would provide the best value for organizations, now and in the future.
More SolarWinds Attack Details Emerge
News  |  1/12/2021  | 
A third piece of malware is uncovered, but there are still plenty of unknowns about the epic attacks purportedly out of Russia.
United Nations Security Flaw Exposed 100K Staff Records
Quick Hits  |  1/12/2021  | 
Security researchers have disclosed a vulnerability they exploited to access more than 100,000 private employee records.
Microsoft Defender Zero-Day Fixed in First Patch Tuesday of 2021
News  |  1/12/2021  | 
Microsoft patched 83 bugs, including a Microsoft Defender zero-day and one publicly known elevation of privilege flaw.
How to Boost Executive Buy-In for Security Investments
Commentary  |  1/12/2021  | 
Linking security budgets to breach-protection outcomes helps executives balance spending against risk and earns CISOs greater respect in the C-suite.
Security Operations Struggle to Defend Value, Keep Workers
News  |  1/12/2021  | 
Companies continue to value security operations centers but the economics are increasingly challenging, with high analyst turnover and questions raised over return on investment.
Bringing Zero Trust to Secure Remote Access
Commentary  |  1/12/2021  | 
Demand for secure remote access has skyrocketed during the pandemic. Here Omdia profiles more secure alternatives to virtual private network (VPN) technology.
Over-Sharer or Troublemaker? How to Identify Insider-Risk Personas
Commentary  |  1/12/2021  | 
It's past time to begin charting insider risk indicators that identify risky behavior and stop it in its tracks.
Intel's New vPro Processors Aim to Help Defend Against Ransomware
News  |  1/11/2021  | 
The newest Intel Core vPro mobile platform gives PC hardware a direct role in detecting ransomware attacks.
IoT Vendor Ubiquiti Suffers Data Breach
Quick Hits  |  1/11/2021  | 
Cloud provider hosting "certain" IT systems attacked, company says.
SolarWinds Hack Lessons Learned: Finding the Next Supply Chain Attack
Commentary  |  1/11/2021  | 
The SolarWinds supply chain compromise won't be the last of its kind. Vendors and enterprises alike must learn and refine their detection efforts to find the next such attack.
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
News  |  1/11/2021  | 
How two traditionally disparate security disciplines can be united.
New Tool Sheds Light on AppleScript-Obfuscated Malware
News  |  1/11/2021  | 
The AEVT decompiler helped researchers analyze a cryptominer campaign that used AppleScript for obfuscation and will help reverse engineers focused on other Mac OS malware.
When It Comes To Security Tools, More Isn't More
Commentary  |  1/11/2021  | 
Organizations that focus on optimizing their tools, cutting down on tool sprawl, and taking a strategic approach to transitioning to the cloud are poised for success.
Russian Hacker Sentenced to 12 Years for Role in Breaches of JP Morgan, Others
Quick Hits  |  1/8/2021  | 
Crimes netted him $19 million overall.
Malware Developers Refresh Their Attack Tools
News  |  1/8/2021  | 
Cisco analyzes the latest version of the LokiBot malware for stealing credentials, finding that its developers have added more misdirection and anti-analysis features.
SolarWinds Hires Chris Krebs and Alex Stamos for Breach Recovery
Quick Hits  |  1/8/2021  | 
The former US cybersecurity official and former Facebook security chief will help SolarWinds respond to its recent attack and improve security.
Top 5 'Need to Know' Coding Defects for DevSecOps
Commentary  |  1/8/2021  | 
Integrating static analysis into the development cycle can prevent coding defects and deliver secure software faster.
Cobalt Strike & Metasploit Tools Were Attacker Favorites in 2020
News  |  1/7/2021  | 
Research reveals APT groups and cybercriminals employ these offensive security tools as often as red teams.
FireEye's Mandia: 'Severity-Zero Alert' Led to Discovery of SolarWinds Attack
News  |  1/7/2021  | 
CEO Kevin Mandia shared some details on how his company rooted out the major cyberattack campaign affecting US government and corporate networks.
State Dept. to Create New Cybersecurity & Technology Agency
Quick Hits  |  1/7/2021  | 
Bureau of Cyberspace Security and Emerging Technologies (CSET) will serve as diplomatic arm for US cybersecurity interests.
Even Small Nations Have Jumped into the Cyber Espionage Game
News  |  1/7/2021  | 
While the media tends to focus on the Big 5 nation-state cyber powers, commercial spyware has given smaller countries sophisticated capabilities, as demonstrated by a "zero-click" iMessage exploit that targeted journalists last year.
Ransomware Victims' Data Published via DDoSecrets
Quick Hits  |  1/7/2021  | 
Activists behind Distributed Denial of Secrets has shared 1TB of data pulled from Dark Web sites where it was shared by ransomware attackers.
Page 1 / 2   >   >>


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22847
PUBLISHED: 2021-01-22
Hyweb HyCMS-J1's API fail to filter POST request parameters. Remote attackers can inject SQL syntax and execute commands without privilege.
CVE-2021-22849
PUBLISHED: 2021-01-22
Hyweb HyCMS-J1 backend editing function does not filter special characters. Users after log-in can inject JavaScript syntax to perform a stored XSS (Stored Cross-site scripting) attack.
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...