Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in November 2019
<<   <   Page 3 / 3
Bugcrowd Pays Out Over $500K in Bounties in One Week
News  |  11/8/2019  | 
In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone.
Hospital Cyberattacks Linked to Increase in Heart Attack Mortality
Quick Hits  |  11/8/2019  | 
Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds.
Ring Flaw Underscores Impact of IoT Vulnerabilities
News  |  11/8/2019  | 
A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.
'Quantum Dawn' Raid as Financial Industry Simulates Global Ransomware Attack
Larry Loeb  |  11/8/2019  | 
Financial institutions in Asia, the US and the UK are put through their paces.
9 Principles to Simplify Security
Commentary  |  11/8/2019  | 
This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.
6 Small-Business Password Managers
Slideshows  |  11/8/2019  | 
The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.
Twitter & Trend Micro Fall Victim to Malicious Insiders
News  |  11/7/2019  | 
The companies are the latest on a long and growing list of organizations that have fallen victim to users with legitimate access to enterprise systems and data.
TA542 Brings Back Emotet with Late September Spike
News  |  11/7/2019  | 
Overall volumes of banking Trojans and RATs increased during the third quarter, when Emotet was suspiciously absent until mid-September.
To Prove Cybersecurity's Worth, Create a Cyber Balance Sheet
Commentary  |  11/7/2019  | 
How tying and measuring security investments to business impacts can elevate executives' understanding and commitment to cyber-risk reduction.
Capital One Shifts Its CISO to New Role
Quick Hits  |  11/7/2019  | 
The bank is searching for a new chief information security officer months after its major data breach.
PayPal Upsets Microsoft as Phishers' Favorite Brand
Quick Hits  |  11/7/2019  | 
Several factors edged the world's most popular payment service into the top spot.
The Cold Truth about Cyber Insurance
Commentary  |  11/7/2019  | 
There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.
Kaspersky Analysis Shines Light on DarkUniverse APT Group
News  |  11/7/2019  | 
Threat actor was active between 2009 and 2017, targeting military, government, and private organizations.
Black Hat Q&A: Hacking a '90s Sports Car
News  |  11/7/2019  | 
Security researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering.
Accounting Scams Continue to Bilk Businesses
News  |  11/6/2019  | 
Yes, ransomware is plaguing businesses and government organizations, but impersonators inserting themselves into financial workflows most often via e-mail continue to enable big paydays.
Google Announces App Defense Alliance
Quick Hits  |  11/6/2019  | 
The industry partnership will scan apps for malware before they're published on the Google Play Store.
Social Media: Corporate Cyber Espionage's Channel of Choice
Commentary  |  11/6/2019  | 
Proactive defense and automation can help your company deal with scale and prioritize risks in order to more efficiently fight cyber espionage.
California DMV Leak Spills Data from Thousands of Drivers
Quick Hits  |  11/6/2019  | 
Federal agencies reportedly had improper access to Social Security data belonging to 3,200 license holders.
Study Finds Customer Data to Be Most at Risk From Insiders
Larry Loeb  |  11/6/2019  | 
Companies say that they are somewhat more worried about inadvertent insider breaches and negligent data breaches than they are about malicious intent by bad actors.
The Uphill Battle of Triaging Alerts
Commentary  |  11/6/2019  | 
Prioritizing alerts is foundational to security, but almost every organization struggles to manage this process efficiently. Here's what you can do about it.
Siemens PLC Feature Can Be Exploited for Evil - and for Good
News  |  11/5/2019  | 
A hidden feature in some newer models of the vendor's programmable logic controllers leaves the devices open to attack. Siemens says it plans to fix it.
CrowdStrike Adds New Products & Web Store Apps
Quick Hits  |  11/5/2019  | 
Company introduces Falcon for AWS, Falcon Firewall Management, and third-party applications.
Google Launches OpenTitan Project to Open Source Chip Security
News  |  11/5/2019  | 
OpenTitan is an open source collaboration among Google and technology companies to strengthen root-of-trust chip design.
Disclosure Does Little to Dissuade Cyber Spies
News  |  11/5/2019  | 
In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to switch to new infrastructure and continue operations.
10 Tips for Building Compliance by Design into Cloud Architecture
Slideshows  |  11/5/2019  | 
A pair of experts pass along lessons learned while building out the team and processes necessary to support Starbucks' mobile app.
The State of Email Security and Protection
Commentary  |  11/5/2019  | 
Phishing and ransomware top the list of security risks that organizations are not fully prepared to deal with.
Complex Q3 DDoS Can Have 11 Attack Vectors
Larry Loeb  |  11/5/2019  | 
Link 11 has issued a summary of what they have found out about characteristics of DDoS attacks that occurred in Q3 2019.
Proofpoint Acquires ObserveIT to Bolster DLP Capabilities
Quick Hits  |  11/5/2019  | 
The $225 million acquisition will help Proofpoint expand its data loss prevention capabilities with email, CASB, and data at rest.
Building Your Secure Cloud-Ready Branch
Nirav Shah  |  11/5/2019  | 
Many organizations are developing a cloud-ready branch strategy that relies on SD-WAN to enable direct Internet access for fast cloud access and improved cloud application performance.
Enterprise Web Security: Risky Business
Commentary  |  11/5/2019  | 
Web development is at much more risk than commonly perceived. As attackers eye the enterprise, third-party code provides an easy way in.
75% of Enterprises Will Adopt a Zero Trust Solution Within a Year – Zscaler
Larry Loeb  |  11/5/2019  | 
Zero Trust Network Access (ZTNA) services are built to ensure that only authorized users can access specific applications on a network based on business policies.
Microsoft Security Setting Ironically Increases Risks for Office for Mac Users
News  |  11/4/2019  | 
Excel's handling of an old macro format gives unauthenticated remote attackers a way to take control of vulnerable systems, Carnegie Mellon's CERT/CC says.
Microsoft Tools Focus on Insider Risk, Data Protection at Ignite 2019
News  |  11/4/2019  | 
New tools and updates aimed at addressing ongoing challenges with insider threats and sensitive data classification.
First Bluekeep Exploit Found in the Wild
Quick Hits  |  11/4/2019  | 
Crashing honeypots alerted the researcher who found the Bluekeep vulnerability.
Sumo Logic Buys JASK Labs to Tackle SOC Challenges
Quick Hits  |  11/4/2019  | 
Sumo Logic plans to integrate JASK's autonomous security operations center software into a new intelligence tool.
To Secure Multicloud Environments, First Acknowledge You Have a Problem
Commentary  |  11/4/2019  | 
Multicloud environments change rapidly. Organizations need a security framework that is purpose-built for the cloud and that aligns with their digital transformation strategy.
Free & Discounted Security Services Now Available for US Election Orgs
News  |  11/1/2019  | 
Nonprofit Defending Digital Campaigns (DDC) offers security services for email, user education, mobile, and encrypted communications, to federal election committees.
Details of Attack on Electric Utility Emerge
Quick Hits  |  11/1/2019  | 
The March 5 DDoS attack interrupted communications between generating facilities and the electrical grid in three western states.
Google Patches Chrome Zero-Day Under Active Attack
Quick Hits  |  11/1/2019  | 
The fix addresses CVE-2019-13720, a high-severity, use-after-free vulnerability discovered by Kaspersky Lab researchers.
8 Holiday Security Tips for Retailers
Slideshows  |  11/1/2019  | 
Here's how retailers can protect their businesses from attackers and scammers hoping to wreak havoc during the most wonderful time of the year.
Raising Security Awareness: Why Tools Can't Replace People
Commentary  |  11/1/2019  | 
Training your people and building relationships outside of the security organization is the most significant investment a CISO can make.
<<   <   Page 3 / 3


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27180
PUBLISHED: 2021-04-14
An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user.
CVE-2021-27181
PUBLISHED: 2021-04-14
An issue was discovered in MDaemon before 20.0.4. Remote Administration allows an attacker to perform a fixation of the anti-CSRF token. In order to exploit this issue, the user has to click on a malicious URL provided by the attacker and successfully authenticate into the application. Having the va...
CVE-2021-27182
PUBLISHED: 2021-04-14
An issue was discovered in MDaemon before 20.0.4. There is an IFRAME injection vulnerability in Webmail (aka WorldClient). It can be exploited via an email message. It allows an attacker to perform any action with the privileges of the attacked user.
CVE-2021-27183
PUBLISHED: 2021-04-14
An issue was discovered in MDaemon before 20.0.4. Administrators can use Remote Administration to exploit an Arbitrary File Write vulnerability. An attacker is able to create new files in any location of the filesystem, or he may be able to modify existing files. This vulnerability may directly lead...
CVE-2021-29449
PUBLISHED: 2021-04-14
Pi-hole is a Linux network-level advertisement and Internet tracker blocking application. Multiple privilege escalation vulnerabilities were discovered in version 5.2.4 of Pi-hole core. See the referenced GitHub security advisory for details.