Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content
Page 1 / 2   >   >>
How to Negotiate With Ransomware Attackers
News  |  11/15/2021  | 
Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.
Cloud Attack Analysis Unearths Lessons for Security Pros
News  |  11/11/2021  | 
Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.
What Happens If Time Gets Hacked
News  |  11/11/2021  | 
Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.
Hacker-for-Hire Group Spied on More Than 3,500 Targets in 18 Months
News  |  11/10/2021  | 
Russian-speaking "Void Balaur" group's victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.
ChaosDB: Researchers Share Technical Details of Azure Flaw
News  |  11/10/2021  | 
Wiz researchers who discovered a severe flaw in the Azure Cosmos DB database discussed the full extent of the vulnerability at Black Hat Europe.
Securing the Public: Who Should Take Charge?
News  |  11/10/2021  | 
International policy expert Marietke Schaake explores the intricacies of protecting the public as governments depend on private companies to build and secure digital infrastructure.
Dark Reading Video News Desk Comes to Black Hat Europe
News  |  11/10/2021  | 
While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices around the world.
Researcher Details Vulnerabilities Found in AWS API Gateway
News  |  11/10/2021  | 
AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.
Free Tool Scans Web Servers for Vulnerability to HTTP Header-Smuggling Attacks
News  |  11/1/2021  | 
A researcher will release an open source tool at Black Hat Europe next week that roots out server weaknesses to a sneaky type of attack.
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
News  |  10/29/2021  | 
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.
Read Between the Lines: Finding Flaws in EPUB Reading Systems
News  |  10/27/2021  | 
Security researchers who analyzed 97 free EPUB reading applications found half are not compliant with security recommendations.
Who's In Your Wallet? Exploring Mobile Wallet Security
News  |  10/25/2021  | 
Security flaws in contactless payments for transportation systems could lead to fraud for stolen devices, researchers find.
Applying Behavioral Psychology to Strengthen Your Incident Response Team
News  |  10/11/2021  | 
A deep-dive study on the inner workings of incident response teams leads to a framework to apply behavioral psychology principles to CSIRTs.
CyberArk Leads the PAM Omdia Universe
Commentary  |  10/7/2021  | 
With more staff working remotely, privileged access management (or PAM) has never been more important. Market forecasts, drivers, and trends are explored.
Research Highlights Significant Evolution in Email Security
Commentary  |  9/27/2021  | 
Email security is in transition, from on-premises to the cloud, from inline to API-based, and from stand-alone to integrated into XDR. New research from Omdia highlights where the market is today, and where it is heading.
UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data
Commentary  |  9/22/2021  | 
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.
FragAttacks Foil 2 Decades of Wireless Security
News  |  8/6/2021  | 
Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.
Researchers Call for 'CVE' Approach for Cloud Vulnerabilities
News  |  8/6/2021  | 
New research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security.
HTTP/2 Implementation Errors Exposing Websites to Serious Risks
News  |  8/5/2021  | 
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
CISA Launches JCDC, the Joint Cyber Defense Collaborative
News  |  8/5/2021  | 
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
Incident Responders Explore Microsoft 365 Attacks in the Wild
News  |  8/5/2021  | 
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
Researchers Find Significant Vulnerabilities in macOS Privacy Protections
News  |  8/5/2021  | 
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
A New Approach to Securing Authentication Systems' Core Secrets
News  |  8/5/2021  | 
Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
Organizations Still Struggle to Hire & Retain Infosec Employees: Report
News  |  8/5/2021  | 
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
Why Supply Chain Attacks Are Destined to Escalate
News  |  8/5/2021  | 
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.
New Normal Demands New Security Leadership Structure
News  |  8/2/2021  | 
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
News  |  8/2/2021  | 
"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.
8 Security Tools to be Unveiled at Black Hat USA
Slideshows  |  7/28/2021  | 
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
Biden Administration Responds to Geopolitical Cyber Threats
Commentary  |  7/23/2021  | 
In response to growing concerns regarding the recent uptick in large-scale, nation-state-backed ransomware attacks on critical infrastructure, the Biden administration is taking new action to tackle the evolving challenges posed by ransomware attacks.
7 Hot Cyber Threat Trends to Expect at Black Hat
Slideshows  |  7/22/2021  | 
A sneak peek of some of the main themes at Black Hat USA next month.
Law Firm for Ford, Pfizer, Exxon Discloses Ransomware Attack
Quick Hits  |  7/19/2021  | 
Campbell Conroy & O'Neil reports the attack affected personal data including Social Security numbers, passport numbers, and payment card data for some individuals.
US Accuses China of Using Criminal Hackers in Cyber Espionage Operations
News  |  7/19/2021  | 
DOJ indicts four Chinese individuals for alleged role in attacks targeting intellectual property, trade secrets belonging to defense contractors, maritime companies, aircraft service firms, and others.
NSO Group Spyware Used On Journalists & Activists Worldwide
Quick Hits  |  7/19/2021  | 
An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world.
7 Ways AI and ML Are Helping and Hurting Cybersecurity
Commentary  |  7/19/2021  | 
In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they can create significant harm.
Breaking Down the Threat of Going All-In With Microsoft Security
Commentary  |  7/19/2021  | 
Limit risk by dividing responsibility for infrastructure, tools, and security.
Researchers Create New Approach to Detect Brand Impersonation
News  |  7/16/2021  | 
A team of Microsoft researchers developed and trained a Siamese Neural Network to detect brand impersonation attacks.
Recent Attacks Lead to Renewed Calls for Banning Ransom Payments
News  |  7/16/2021  | 
While attackers in protected jurisdictions continue to get massive sums for continuing to breach organizations, the ransomware threat will only continue to grow.
4 Future Integrated Circuit Threats to Watch
Commentary  |  7/16/2021  | 
Threats to the supply chains for ICs and other computer components are poised to wreak even more havoc on organizations.
Attackers Exploited 4 Zero-Day Flaws in Chrome, Safari & IE
News  |  7/15/2021  | 
At least two government-backed actors -- including one Russian group -- used the now-patched flaws in separate campaigns, Google says.
State Dept. to Pay Up to $10M for Information on Foreign Cyberattacks
News  |  7/15/2021  | 
The Rewards for Justice program, a counterterrorism tool, is now aimed at collecting information on nation-states that use hackers to disrupt critical infrastructure.
CISA Launches New Website to Aid Ransomware Defenders
Quick Hits  |  7/15/2021  | 
StopRansomware.gov provides information to help organizations protect against, and respond to, ransomware attacks.
Microsoft: Israeli Firm's Tools Used to Target Activists, Dissidents
News  |  7/15/2021  | 
Candiru sold spyware that exploited Windows vulnerabilities and had been used in attacks against dissidents, activists, and journalists.
IoT-Specific Malware Infections Jumped 700% Amid Pandemic
Quick Hits  |  7/15/2021  | 
Gafgyt and Mirai malware represented majority of IoT malware, new data from Zscaler shows.
How to Bridge On-Premises and Cloud Identity
Commentary  |  7/15/2021  | 
Identity fabric, a cloud-native framework, removes the need for multiple, siloed, proprietary identity systems.
What to Look for in an Effective Threat Hunter
Commentary  |  7/15/2021  | 
The most important personality traits, skills, and certifications to look for when hiring a threat hunting team.
SonicWall: 'Imminent' Ransomware Attack Targets Older Products
Quick Hits  |  7/14/2021  | 
The attack exploits a known vulnerability that was fixed in new versions of firmware released this year.
Google to Bring HTTPS-First Mode to Chrome Browser
Quick Hits  |  7/14/2021  | 
Beginning in M94, Chrome will offer HTTPS-First Mode, which will attempt to upgrade all page loads to HTTPS.
Targeted Attack Activity Heightens Need for Orgs. to Patch New SolarWinds Flaw
News  |  7/14/2021  | 
A China-based threat actor -- previously observed targeting US defense industrial base organizations and software companies -- is exploiting the bug in SolarWinds' Serv-U software, Microsoft says.
Did the Cybersecurity Workforce Gap Distract Us From the Leak?
Commentary  |  7/14/2021  | 
Cyber games can play a critical role in re-engaging our workforce and addressing the employee retention crisis.
4 Integrated Circuit Security Threats and How to Protect Against Them
Commentary  |  7/14/2021  | 
Little-understood threats involving the IC supply chain are putting organizations around the world at risk.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-22703
PUBLISHED: 2022-01-17
In Stormshield SSO Agent 2.x before 2.1.1 and 3.x before 3.0.2, the cleartext user password and PSK are contained in the log file of the .exe installer.
CVE-2021-42357
PUBLISHED: 2022-01-17
When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be pr...
CVE-2022-0242
PUBLISHED: 2022-01-17
Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.
CVE-2021-38965
PUBLISHED: 2022-01-17
IBM FileNet Content Manager 5.5.4, 5.5.6, and 5.5.7 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 212346.
CVE-2021-33040
PUBLISHED: 2022-01-17
managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS.