Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in April 2018
<<   <   Page 2 / 5   >   >>
Golden Galleon Raids Maritime Shipping Firms
News  |  4/24/2018  | 
A new Nigerian criminal gang is launching attacks on the maritime industry.
Threat Intel: Finding Balance in an Overcrowded Market
News  |  4/23/2018  | 
Industry insiders discuss how threat intelligence has changed and what may happen as the market becomes increasingly saturated.
Threat Actors Turn to Blockchain Infrastructure to Host & Hide Malicious Activity
News  |  4/23/2018  | 
.bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says.
New Survey Shows Hybrid Cloud Confidence
Quick Hits  |  4/23/2018  | 
Executives are mostly confident in their hybrid cloud security, according to the results of a new survey.
Cybercrime: More Like Facebook's Model Than Traditional Criminal Enterprise
Larry Loeb  |  4/23/2018  | 
As the global economy has changed, so has cybercrime, which resembles something much closer to how Facebook works than a traditional criminal enterprise, according to a new report.
Digital Identity Makes Headway Around the World
Commentary  |  4/23/2018  | 
The US is lagging behind the digital ID leaders.
It's the People: 5 Reasons Why SOC Can't Scale
Alan Zeichick  |  4/23/2018  | 
There are always more security alerts and threats to respond, but the answer isn't to simply throw more money at the SOC to hire additional Tier 1 and Tier 2 security analysts.
IDS & IPS: Two Essential Security Measures
Partner Perspectives  |  4/23/2018  | 
To protect business networks, one line of security isn't enough.
At-Risk Routers & Russian Hacking Plans Stir Talk at RSA
News Analysis-Security Now  |  4/23/2018  | 
At last week's RSA conference, the recent US and UK disclosure that Russia-backed actors have been targeting unpatched and older routers stirred conversations among security experts.
Cybercrime Economy Generates $1.5 Trillion a Year
News  |  4/20/2018  | 
Threat actors generate, launder, spend, and reinvest more than $1.5 trillion in illicit funds, according to a new study on cybercrime's 'web of profit.'
Trust: The Secret Ingredient to DevSecOps Success
News  |  4/20/2018  | 
Security practitioners must build trusted relationships with developers and within cross-functional DevOps teams to get themselves embedded into continuous software delivery processes.
SunTrust Ex-Employee May Have Stolen Data on 1.5 Million Bank Clients
Quick Hits  |  4/20/2018  | 
Names, addresses, phone numbers, account balances, may have been exposed.
DNC Sues Guccifer 2.0, Russian Federation & Trump Campaign for Election Conspiracy
Quick Hits  |  4/20/2018  | 
DNC first hacked by Russians in 2015, according to the filing.
Biometrics Are Coming & So Are Security Concerns
Commentary  |  4/20/2018  | 
Could these advanced technologies be putting user data at risk?
Login With Facebook & Watch Your Personal Data Leak
Larry Loeb  |  4/20/2018  | 
A common feature on many popular websites allows users to login with their Facebook profile. However, a trio of Princeton researchers show that this feature allows personal information to leak and be collected.
At RSAC, SOC 'Sees' User Behaviors
News  |  4/20/2018  | 
Instruments at the RSA Security Operations Center give analysts insight into attendee behavior on an open network.
Cyber Attacks Have Doubled, but Security Is Getting Better at Blocking Them
Jeffrey Burt  |  4/20/2018  | 
In a survey, Accenture said the number of targeted attacks like ransomware and DDoS are growing, but organizations are getting better and faster at detecting them.
Microsoft CISO Talks Threat Intel, 'Data Inclusion'
News  |  4/19/2018  | 
Dark Reading caught up with Microsoft's Bret Arsenault to discuss intelligence, identity, and the need to leverage more diverse datasets.
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Quick Hits  |  4/19/2018  | 
Booz Allen survey shows most organizations' answer to the security skills shortage may be unsustainable.
Free endpoint scanning service powered by Open Threat Exchange
Free endpoint scanning service powered by Open Threat Exchange
Dark Reading Videos  |  4/19/2018  | 
Russ Spitler, AlienVaults SVP of Products, explains how security pros can leverage the community-powered threat intelligence of OTX which sees more than 19 million IoCs contributed daily by a global community of 80,000 peers to quickly protect themselves against emerging attacks.
Can machine learning improve your endpoint detection and response?
Can machine learning improve your endpoint detection and response?
Dark Reading Videos  |  4/19/2018  | 
To intervene with optimum efficiency, response team needs to zero in on the most potentially dangerous endpoint anomalies first. And according to Harish Agastya, VP of Enterprise Solutions at Bitdefender, machine learning-assisted EDR can help you do exactly that.
Successfully Using Deception Against APTs
Successfully Using Deception Against APTs
Dark Reading Videos  |  4/19/2018  | 
According to Illusive CEO Ofer Israeli, deception technology can provide a vital layer of protection from advanced persistent threats (APTs) by presenting attackers with seemingly genuine servers that both divert them from high-value digital assets and make it easier to pinpoint malicious network activity.
Should CISOs Be Hackers?
Should CISOs Be Hackers?
Dark Reading Videos  |  4/19/2018  | 
Justin Calmus, Chief Security Officer at OneLogin, believes that cybersecurity professionals including CISOs and other security team leaders can be much more effective at their jobs if they stay actively engaged with hacking communities that keep them on their toes and give them deep insight into attack trends.
Securing Social Media: National Safety, Privacy Concerns
News  |  4/19/2018  | 
It's a critical time for social media platforms and the government agencies and private businesses and individuals using them.
Protecting Data Anywhere and Everywhere
Protecting Data Anywhere and Everywhere
Dark Reading Videos  |  4/19/2018  | 
SecurityFirst CEO Jim Varner explains how resellers and MSPs can work with their clients to ensure that all of their business-critical data everywhere can be kept safe from attackers and readily available for disaster recovery even as threats intensify and digital assets are dispersed across multiple clouds.
Supporting Infosec Needs for Cybersecurity Speed, Scope and Skills
Supporting Infosec Needs for Cybersecurity Speed, Scope and Skills
Dark Reading Videos  |  4/19/2018  | 
Given intensifying threats and limited infosec budgets, Endgame CTO Jamie Butler suggests that security leaders deploy tools that leverage machine learning, chatbots, and other technologies to make Tier 1/Tier 2 staff much more effective at stopping even relatively sophisticated attacks.
Using Carrier Intelligence to Validate Mobile User Identity
Using Carrier Intelligence to Validate Mobile User Identity
Dark Reading Videos  |  4/19/2018  | 
To confidently validate the identity of mobile users without adding business-killing friction to login and on-boarding processes, Lea Tarnowski and Wendell Brown of Averon suggest leveraging the intelligence mobile carriers already have about their customers.
Firewall Fail: IT Can't Identify All Network Traffic
News Analysis-Security Now  |  4/19/2018  | 
With more and more traffic being encrypted, IT departments are having difficulty identifying the source of traffic coming into their network and past the firewall.
First Public Demo of Data Breach via IoT Hack Comes to RSAC
News  |  4/19/2018  | 
At RSA Conference, senior researchers will show how relatively unskilled attackers can steal personally identifiable information without coming into contact with endpoint security tools.
How to Protect Industrial Control Systems from State-Sponsored Hackers
Commentary  |  4/19/2018  | 
US-CERT recently issued an alert about Russian threat activity against infrastructure sectors. Is there a way to fight back?
Microsoft Security Is Channeling the Terminator
Alan Zeichick  |  4/19/2018  | 
In its own way of channeling the Terminator and Skynet, Microsoft is looking to add more layers of artificial intelligence into its Windows Defender ATP to further reduce remediation and increase automation of security.
Researchers Discover Second rTorrent Vulnerability Campaign
Partner Perspectives  |  4/19/2018  | 
This time attackers appears to have spoofed the Recording Industry Association of America (RIAA) and New York University (NYU) user-agents.
In Wake of Spectre & Meltdown, Intel Shifts Memory Scanning to GPU
Jeffrey Burt  |  4/19/2018  | 
At the RSA Conference this week, Intel introduced several silicon-level security technologies, including moving memory scanning from the CPU to the GPU, as part of its larger 'security-first' strategy following the Spectre and Meltdown issues.
DHS Helps Shop Android IPS Prototype
News  |  4/18/2018  | 
A MITRE-developed intrusion prevention system for mobile technology is showcased here this week at the RSA Conference.
70% of Energy Firms Worry About Physical Damage from Cyberattacks
Quick Hits  |  4/18/2018  | 
High-profile ICS attacks Triton/Trisis, Industroyer/CrashOverride, and Stuxnet have driven energy firms to invest more in cybersecurity, survey shows.
The Role of KPIs in Incident Response
Commentary  |  4/18/2018  | 
Using KPIs can have a positive impact on the tactical and strategic functions of a security operations program.
Cyber War Game Shows How Federal Agencies Disagree on Incident Response
News  |  4/18/2018  | 
Former officials at DHS, DOJ, and DOD diverge on issues of attribution and defining what constitutes an act of cyber war.
Stopping Bots and Credential Stuffing: A Smarter Strategy
Stopping Bots and Credential Stuffing: A Smarter Strategy
Dark Reading Videos  |  4/18/2018  | 
Patrick Sullivan, Senior Director Security Strategy at Akamai Technologies, explains why cybersecurity teams need better mechanisms for controlling bot activity and why all bots are not created equal.
Leveraging Threat Intelligence across Infosec Roles
Leveraging Threat Intelligence across Infosec Roles
Dark Reading Videos  |  4/18/2018  | 
Allan Liska, Senior Security Architect at Recorded Future, believes everyone in the infosec team including vulnerability management and threat response staff can take greater advantage of available threat intelligence to more effectively and efficiently mitigate risk.
Practically Applying Threat Intelligence to Your Business
Practically Applying Threat Intelligence to Your Business
Dark Reading Videos  |  4/18/2018  | 
Travis Farral, Director of Security Strategy at Anomali, believes cybersecurity teams can operate much more efficiently by better identifying the specific threats that endanger their environment and by better understanding the potential impacts of those specific threats.
Enabling Appropriate User Access in a Zero Trust World
Enabling Appropriate User Access in a Zero Trust World
Dark Reading Videos  |  4/18/2018  | 
Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing todays perimeter-less enterprise environments including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes, and smarter use of ML for anomaly detection.
Keeping the Business Safe Across Hybrid Cloud Environments
Keeping the Business Safe Across Hybrid Cloud Environments
Dark Reading Videos  |  4/18/2018  | 
Aggressive cloud adoption increases threat surface and makes it more difficult for infosec teams to keep track of what the business is doing. Donald Meyer, Head of Data Center and Cloud at Check Point Software, explains how infosec teams can more effectively mitigate risk without hampering business agility.
Beating Zero-Payload/Fileless Attacks with Unified EPP/EDR
Beating Zero-Payload/Fileless Attacks with Unified EPP/EDR
Dark Reading Videos  |  4/18/2018  | 
To cope with todays fileless endpoint attacks especially those that arent precisely similar to previously known exploits Tomer Weingarten and Nicholas Warner of SentinelOne suggest a unified EPP/EDR approach that includes visibility into the dangers lurking within encrypted network traffic.
Optimizing the Security Awareness of Your End-Users
Optimizing the Security Awareness of Your End-Users
Dark Reading Videos  |  4/18/2018  | 
End-users can be the weakest link in your infosec defense. But according to KnowBe4 founder and CEO Stu Sjouwerman, there is something you can do about that if you implement the right behavioral diagnostics and focus your training needs on individual users actual weaknesses.
DHS Secretary Kirstjen Nielsen: Cybercrime Will Reach $6 Trillion Annually
News Analysis-Security Now  |  4/18/2018  | 
Kirstjen Nielsen, the secretary of the US Department of Homeland Security, told this week's RSA Conference that cybercrime will reach $6 trillion annually within the next three years, and that the federal government and private business need to step up their game.
How to Leverage Artificial Intelligence for Cybersecurity
Partner Perspectives  |  4/18/2018  | 
AI and predictive analytics should be used to augment a companys security team, not replace it. Here's why.
Data Visibility, Control Top Cloud Concerns at RSA
News  |  4/18/2018  | 
As the traditional perimeter dissolves and sensitive data moves to the cloud, security experts at RSA talk about how they're going to protect it.
Alert Warns Russian Actors Are Targeted Unsecured Network Devices
Larry Loeb  |  4/18/2018  | 
A join statement from UK and US law enforcement and security agencies are warning that Russian actors are targeting older and unpatched network infrastructure as part of an ongoing cyberespionage campaign.
Microsoft's Brad Smith: 2017 Was a Cybersecurity Wake-Up Call
News Analysis-Security Now  |  4/18/2018  | 
Brad Smith, Microsoft's president and chief legal officer, spoke at RSA 2018 about the cybersecurity wake-up call that was 2017, and what improvements the industry could make in 2018.
2018 RSA Conference: Execs Push Cooperation, Culture & Civilian Safety
News  |  4/17/2018  | 
On the keynote stage, execs from Microsoft and McAfee introduced a new Cybersecurity Tech Accord.
<<   <   Page 2 / 5   >   >>


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27706
PUBLISHED: 2021-04-14
Buffer Overflow in Tenda G1 and G3 routers with firmware version V15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/&quot;IPMacBindIndex &quot;request. This occurs because the &quot;formIPMacBindDel&quot; function directly passes the parameter &quot;IPMacBind...
CVE-2021-27707
PUBLISHED: 2021-04-14
Buffer Overflow in Tenda G1 and G3 routers with firmware v15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/&quot;portMappingIndex &quot;request. This occurs because the &quot;formDelPortMapping&quot; function directly passes the parameter &quot;portMappingIn...
CVE-2021-28098
PUBLISHED: 2021-04-14
An issue was discovered in Forescout CounterACT before 8.1.4. A local privilege escalation vulnerability is present in the logging function. SecureConnector runs with administrative privileges and writes logs entries to a file in %PROGRAMDATA%\ForeScout SecureConnector\ that has full permissions for...
CVE-2021-30493
PUBLISHED: 2021-04-14
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the ChromaBroadcast subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other wor...
CVE-2021-30494
PUBLISHED: 2021-04-14
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other wo...