Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in April 2015
<<   <   Page 2 / 2
Authorities Take Down Malware-Distributing Simda Botnet
News  |  4/14/2015  | 
Fourteen C&Cs dismantled to take out nerve center of a botnet that spanned 190 countries.
Police Pay Off Ransomware Operators, Again
News  |  4/14/2015  | 
Law enforcement agencies are proving to be easy marks -- but are they any worse than the rest of us?
Setting Security Professionals Up For Success
Commentary  |  4/14/2015  | 
People, process, and technology are all integral to a successful infosec program. Whats too often missing involves the concept of workflow.
Botnet to Cybersecurity: Catch Me If You Can
Partner Perspectives  |  4/14/2015  | 
Tracking and disrupting the crime ring behind a polymorphic botnet.
Verizon DBIR: Mobile Devices Not A Factor In Real-World Attacks
News  |  4/14/2015  | 
New annual Verizon Data Breach Investigations Report shows most attacks affect a secondary victim, the average cost of a data breach is just 58 cents per stolen record -- and attackers are not going after mobile en masse.
Chinese Nation-State Hackers Give Up Attack Campaign
News  |  4/13/2015  | 
It worked on Hurricane Panda. Can APT30 and other organized cyberespionage groups also be convinced that an attack campaign isn't worth the trouble?
Majority Of Organizations Unprepared For Insider Attacks
News  |  4/13/2015  | 
SANS report shows gaps in insider detection and response.
Better Together: Network Operations & Infosec
Commentary  |  4/13/2015  | 
Getting networking and information security teams together in the same room is a critical step for companies that want to build a continuous information security culture.
New Security Flaw Spans All Versions Of Windows
News  |  4/13/2015  | 
Newly found 'forever-day' vulnerability affects 31 popular software programs including applications from Adobe, Apple, Microsoft, Symantec -- and Windows 10 preview.
Apple Patches 'Darwin Nuke,' Other Security Flaws With New OS Releases
News  |  4/10/2015  | 
Denial-of-service flaw discovered by researchers at Kaspersky Lab could affect Apple users' corporate networks.
Insider Threats: Focus On The User, Not The Data
Commentary  |  4/10/2015  | 
Global cybersecurity spending will hit almost $77 billion in 2015, so why are there more high-profile leaks than ever?
Utilities And Education The Most Bot-Infested Sectors
News  |  4/9/2015  | 
The more bots in-house, the more a company is likely to have reported a data breach, BitSight report finds.
Beebone Botnet Taken Down By Another Security Team-Up
News  |  4/9/2015  | 
Small in scale, but high in sophistication, the Beebone botnet and polymorphic downloader is disrupted by an international, public-private effort.
Solving the Right Problem: Stop Adversaries, Not Just Their Tools
Commentary  |  4/9/2015  | 
A malware-centric strategy is mere childs play against todays sophisticated adversaries. Heres why.
AlienSpy A More Sophisticated Version Of The Same Old RATs
News  |  4/8/2015  | 
The AlienSpy remote access Trojan bears a resemblance to Frutas, Adwind, and Unrecom, say researchers at Fidelis.
Russian Hackers Breached White House Via US State Department
News  |  4/8/2015  | 
Attackers who recently breached the US State Department compromised an unclassified White House system by sending spearphishing messages from a hijacked State Department email account, officials say.
5 Reasons You 'Better Call Saul' To Protect Corporate Data
Commentary  |  4/8/2015  | 
These pop-culture lessons from the entertaining Breaking Bad spinoff will make security awareness training both fun and effective.
Some of the Best Things in Security Are Free
Partner Perspectives  |  4/8/2015  | 
Software tools are available from our consultants free of charge.
Cyber War Games: Top 3 Lessons Learned About Incident Response
News  |  4/7/2015  | 
Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.
3 Internet Of Things Devices That Threaten More Than Your Data
News  |  4/7/2015  | 
Veracode study of IoT devices show how vulnerabilities in our always-on households can have dire real-world consequences.
So, You 'Dont Believe In' Security Education?
Commentary  |  4/7/2015  | 
You're in the minority for a reason. Here's why.
Containing Security
Partner Perspectives  |  4/7/2015  | 
How to identify the appropriate security for your container-based virtual applications.
What Happens When Personal Information Hits The Dark Web
News  |  4/7/2015  | 
Experiment tracked the journey of a cache of phony names, SSNs, credit cards, and other personal information.
3 Of 4 Global 2000 Companies Still Vulnerable To Heartbleed
News  |  4/7/2015  | 
Largest companies on Earth might have patched, but haven't done their due diligence with revoking and issuing new certificates, says Venafi.
Could Security Concerns Scuttle M&A And Investment Deals?
News  |  4/6/2015  | 
Questions of investor notification of Slack breach prior to signing shows how important security posture will be in vetting future deals.
Car-Hacking Prototype Passes Crash Test
News  |  4/6/2015  | 
Sensor-based technology--with military drone roots--created to detect and automatically stop cyberattacks on cars.
Obamas War On Hackers
Commentary  |  4/6/2015  | 
Cybersecurity legislation, for the most part, is a good idea. But not without protections for bug bounty programs and other vital, proactive security research.
Principles of Malware Sinkholing
Partner Perspectives  |  4/6/2015  | 
The process of sinkholing is an important tool to have in your arsenal when dealing with emerging threats.
The Good & Bad Of BYOD
Commentary  |  4/3/2015  | 
BYOD has very little to do with technology and everything to do with security, organizational politics, and human psychology.
Google Spat With Chinese Firm Highlights Digital Certificate Security Challenges
News  |  4/3/2015  | 
Chrome will no longer trust certs issued by CNNIC following recent snafu, and Mozilla Firefox will revoke certs issued by the Chinese authority before April 1.
Google: Less Than 1% Of Androids Have Potentially Harmful App Installed
Quick Hits  |  4/2/2015  | 
Google's Android security report shows that devices that only install apps from the Google Play store have fewer infections.
EFF General Counsel Takes On NSA Spying
News  |  4/2/2015  | 
Kurt Opsahl talks to Dark Reading about government surveillance and privacy in anticipation of his Interop keynote.
8 Identity & Access Metrics To Manage Breach Risks
Slideshows  |  4/2/2015  | 
Measurables for improving security posture around access controls.
Stuxnet Five Years Later: Did We Learn The Right Lesson?
Commentary  |  4/2/2015  | 
No! That's despite an abundance of best practices and standards that are shining light into the dark corners of industrial control system security.
Laziok Trojan Exploits Three Year-Old Windows Flaw
News  |  4/1/2015  | 
Data-stealing malware relies on old bug to break into systems at energy companies.
Obama Signs Executive Order For Sanctions Against Cybercriminals, Cyberspies
Quick Hits  |  4/1/2015  | 
President cites International Emergency Economic Powers Act to allow feds to blacklist foreign individuals or entities behind 'significant malicious cyber-enabled activities'
Dance Of The 'Next-Gen' CISO
News  |  4/1/2015  | 
Security Pro File: Classical ballerina-turned hacker-turned CISO Justine Bone talks old-school hacking, biometric authentication, coding in stilettos, Kristin Wiig -- and finishing her kids' leftover mac and cheese.
Spring Cleaning In The SOC: Focus On the Inside Threat
Commentary  |  4/1/2015  | 
Along with warmer weather and melting snow, spring brings the perfect opportunity for user engagement. Heres how to transform insiders into your most sophisticated security device.
Application of Threat Indicators: A Temporal View
Partner Perspectives  |  4/1/2015  | 
Better outcomes will be achieved when were applying temporal considerations to threat indicators.
<<   <   Page 2 / 2


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24028
PUBLISHED: 2021-04-14
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
CVE-2021-29370
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
CVE-2021-3460
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version 2.0.0.301, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
CVE-2021-3462
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object.
CVE-2021-3463
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could cause systems to experience a blue screen error.