Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in December 2020
Page 1 / 3   >   >>
Microsoft Reveals That Russian Attackers Accessed Some of Its Source Code
Quick Hits  |  12/31/2020  | 
Malicious SolarWinds Orion backdoor installed in Microsoft's network led to the attackers viewing some of its source code.
How to Build Cyber Resilience in a Dangerous Atmosphere
Commentary  |  12/31/2020  | 
Our polarized climate and COVID-19 are putting the nation's cybersecurity in imminent danger, and it's past time to act.
The Coolest Hacks of 2020
News  |  12/31/2020  | 
Despite a pandemic and possibly the worst cyberattack campaign ever waged against the US, the year still had some bright spots when it came to "good" and creative hacks.
Mobile Endpoint Security: Still the Crack in the Enterprise's Cyber Armor
Commentary  |  12/30/2020  | 
A combination of best practices and best-in-class technology will help keep your enterprise from falling victim to ever-growing threats.
DDoS Attacks Spiked, Became More Complex in 2020
News  |  12/30/2020  | 
Global pandemic and the easy availability of for-hire services and inexpensive tool sets gave adversaries more opportunities to attack.
Reducing the Risk of Third-Party SaaS Apps to Your Organization
Commentary  |  12/29/2020  | 
Such apps may try to leak your data, or can contain malicious code. And even legitimate apps may be poorly written, creating security risks.
India: A Growing Cybersecurity Threat
Commentary  |  12/29/2020  | 
Geopolitical tensions and a dramatic rise in offensive and defensive cyber capabilities lead India to join Iran, Russia, China, and North Korea as a top nation-state adversary.
Mac Attackers Remain Focused Mainly on Adware, Fooling Users
News  |  12/29/2020  | 
Despite reports that Macs have encountered more threats than Windows systems, the platform still sees far fewer exploits and malware - including ransomware.
Defending the COVID-19 Vaccine Supply Chain
Commentary  |  12/28/2020  | 
We must treat this supply chain like a piece of our nation's critical infrastructure, just like the electrical grid or air traffic control system.
10 Benefits of Running Cybersecurity Exercises
Commentary  |  12/28/2020  | 
There may be no better way to ascertain your organization's strengths and weaknesses than by running regular security drills.
Remote Desktop Bugs: Patches That Took Priority in a Pandemic Year
News  |  12/28/2020  | 
Remote Desktop flaws were a patching priority this year as Microsoft distributed fixes and businesses scrambled to protect remote employees.
Amazon Gift Card Scam Delivers Dridex This Holiday Season
News  |  12/24/2020  | 
Dridex operators launch a social engineering scam that promises victims a $100 gift card but delivers a banking Trojan.
Quarterbacking Vulnerability Remediation
Commentary  |  12/24/2020  | 
It's time that security got out of the armchair and out on the field.
HelpSystems Acquires Data Security Firm Vera
Quick Hits  |  12/24/2020  | 
The purchase is intended to increase London-based HelpSystems' file collaboration security capabilities.
Microsoft, McAfee, Rapid7, and Others Form New Ransomware Task Force
News  |  12/23/2020  | 
Industry group wants to get a framework in the hands of the new administration's cybersecurity officials by early spring 2021.
White Ops Announces Its Acquisition
Quick Hits  |  12/23/2020  | 
A group including Goldman Sachs Merchant Banking Division, ClearSky Security, and NightDragon has purchased the human verification technology company.
Lazarus Group Seeks Intelligence Related to COVID-19
News  |  12/23/2020  | 
Researchers attribute attacks targeting a pharmaceutical company and a government ministry related to COVID-19 response.
Enterprise IoT Security Is a Supply Chain Problem
Commentary  |  12/23/2020  | 
Organizations that wish to take advantage of the potential benefits of IoT systems in enterprise environments should start evaluating third-party risk during the acquisition process.
SolarWinds Campaign Focuses Attention on 'Golden SAML' Attack Vector
News  |  12/22/2020  | 
Adversaries that successfully execute attack can achieve persistent anytime, anywhere access to a victim network, security researchers say.
Emotet Campaign Restarts After Seven-Week Hiatus
News  |  12/22/2020  | 
Multiple security researchers note the return of an email campaign attempting to spread the malware, which is often used to drop the Ryuk ransomware and Trickbot banking Trojan.
Microsoft Ups Security of Azure AD, Identity
News  |  12/22/2020  | 
A roundup of Microsoft's recent security news and updates that focus on protecting identity.
Prepare to Fight Upcoming Cyber-Threat Innovations
Commentary  |  12/22/2020  | 
Cybercriminals are preparing to use computing performance innovations to launch new types of attacks.
Law Enforcement Disrupts VPN Services Enabling Cybercrime
Quick Hits  |  12/22/2020  | 
The United States and international partners shut down three bulletproof hosting services used to facilitate criminal activity.
Security as Code: How Repeatable Policy-Driven Deployment Improves Security
Commentary  |  12/22/2020  | 
The SaC approach lets users codify and enforce a secure state of application configuration deployment that limits risk.
Cisco, Intel, Deloitte Among Victims of SolarWinds Breach: Report
Quick Hits  |  12/21/2020  | 
The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code.
NSA, CISA Warn of Attacks on Federated Authentication
News  |  12/21/2020  | 
While incident responders focus on attacks using SolarWinds Orion, government cyber defenders highlight other methods likely being used as well.
We Have a National Cybersecurity Emergency -- Here's How We Can Respond
Commentary  |  12/21/2020  | 
Let's prioritize bipartisan strategic actions that can ensure our national security and strengthen the economy. Here are five ideas for how to do that.
Microsoft Confirms Its Network Was Breached With Tainted SolarWinds Updates
News  |  12/18/2020  | 
Attack on thousands of other companies as "moment of reckoning" for governments and industry, company president says.
FBI Warns of DoppelPaymer Attacks on Critical Infrastructure
Quick Hits  |  12/18/2020  | 
The operators behind DoppelPaymer have begun calling victims to pressure them into paying ransom, officials say.
5 Key Takeaways From the SolarWinds Breach
Slideshows  |  12/18/2020  | 
New details continue to emerge each day, and there may be many more lessons to learn from what could be among the largest cyberattacks ever.
2021 Cybersecurity Predictions: The Intergalactic Battle Begins
Commentary  |  12/18/2020  | 
There's much in store for the future of cybersecurity, and the most interesting things aren't happening on Earth.
Malicious Browser Extensions for Social Media Infect Millions of Systems
News  |  12/17/2020  | 
At least 28 third-party add-ons for top social media sites, including Facebook and Vimeo, redirect users to phishing sites and steal data.
'SocGholish' Attack Framework Powers Surge in Drive-By Attacks
News  |  12/17/2020  | 
Menlo Labs research team says framework's social engineering toolkit helps criminals impersonate software updates.
CISA: SolarWinds Not the Only Initial Attack Vector in Massive Breach
Quick Hits  |  12/17/2020  | 
Agency says it has "evidence of additional initial access vectors" besides SolarWinds' Orion software.
Rising to the Challenge: Perspectives from Security Leaders on 2020 and Beyond
News  |  12/17/2020  | 
For those who work in the security industry 2020 has been a particularly challenging year. Chris Price talks to five industry leaders from different perspectives in the sector about how they coped with COVID and asks them to look forward to 2021.
51% of WFH Parents Say Children Have Accessed Work Accounts
Quick Hits  |  12/17/2020  | 
In addition, 14% of surveyed parents who are working from home say their children have access to their work devices, new data shows.
VPNs, MFA & the Realities of Remote Work
Commentary  |  12/17/2020  | 
The work-from-home-era is accelerating cloud-native service adoption.
FireEye Identifies Killswitch for SolarWinds Malware as Victims Scramble to Respond
News  |  12/16/2020  | 
White House National Security Council establishes unified group to coordinate response across federal agencies to the threat.
Attackers Leverage IMAP to Infiltrate Email Accounts
Quick Hits  |  12/16/2020  | 
Researchers believe cybercriminals are using a tool dubbed Email Appender to directly connect with compromised email accounts via IMAP.
New IRS Form Fraud Campaign Targets G Suite Users
Quick Hits  |  12/16/2020  | 
At least 50,000 executives have been affected so far.
US-CERT Reports 17,447 Vulnerabilities Recorded in 2020
News  |  12/16/2020  | 
This marks the fourth year in a row that a record number of vulnerabilities has been discovered, following 17,306 in 2019.
Corporate Credentials for Sale on the Dark Web: How to Protect Employees and Data
Commentary  |  12/16/2020  | 
It's past time to retire passwords in favor of other methods for authenticating users and securing systems.
Why the Weakest Links Matter
Commentary  |  12/16/2020  | 
The recent FireEye and SolarWinds compromises reinforce the fact that risks should be understood, controls should be in place, and care should be taken at every opportunity.
Senior Managers Twice as Likely to Share Work Devices With Outsiders
News  |  12/16/2020  | 
New survey finds top C-suite managers are much shakier on security than their junior counterparts.
Patching Still Poses Problems for Industrial Controllers, Networking Devices
News  |  12/16/2020  | 
More than 90% of devices that run popular embedded operating systems remain vulnerable to critical flaws disclosed more than a year ago.
SSO and MFA Are Only Half Your Identity Governance Strategy
Commentary  |  12/16/2020  | 
We need better ways to manage user identities for accessing applications, especially given the strain it places on overworked IT and security teams.
Concerns Run High as More Details of SolarWinds Hack Emerge
News  |  12/15/2020  | 
Enterprises running company's Orion network management software should assume compromise and respond accordingly, security experts say.
Twitter Fined in Irish GDPR Action
Quick Hits  |  12/15/2020  | 
The $547K fine results from an issue Twitter reported in 2019.
Medical Imaging Leaks Highlight Unhealthy Security Practices
News  |  12/15/2020  | 
More than 45 million unique images, such as X-rays and MRI scans, are accessible to anyone on the Internet, security firm says.
Nowhere to Hide: Don't Let Your Guard Down This Holiday Season
Commentary  |  12/15/2020  | 
Harden your defenses to ensure that your holiday downtime doesn't become an open door for cyber threats.
Page 1 / 3   >   >>


Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21331
PUBLISHED: 2021-03-03
The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive info...
CVE-2021-27940
PUBLISHED: 2021-03-03
resources/public/js/orchestrator.js in openark orchestrator before 3.2.4 allows XSS via the orchestrator-msg parameter.
CVE-2021-21312
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/documen...
CVE-2021-21313
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability in the /ajax/common.tabs.php endpoint, indeed, at least two parameters _target and id are not proper...
CVE-2021-21314
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is an XSS vulnerability involving a logged in user while updating a ticket.