Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in April 2020
Page 1 / 4   >   >>
Microsoft's Records Management Tool Aims to Simplify Data Governance
News  |  4/30/2020  | 
Records Management is intended to help businesses manage security and data governance as more struggle to handle increased amounts of data and regulatory requirements.
Researchers Find Baby Banking Trojan, Watch It Grow
News  |  4/30/2020  | 
EventBot is an Android information stealer on its way to becoming a very capable piece of malware.
Healthcare Targeted By More Attacks But Less Sophistication
News  |  4/30/2020  | 
An increase in attacks targeting healthcare organizations suggests that perhaps new cybercriminals are getting into the game.
Things Keeping CISOs Up at Night During the COVID-19 Pandemic
Commentary  |  4/30/2020  | 
Insights from discussions with more than 20 CISOs, CEOs, CTOs, and security leaders.
Ed-Tech Company Chegg Suffers Third Breach Since 2018
Quick Hits  |  4/30/2020  | 
The latest incident compromised names, Social Security numbers, and other data belonging to 700 current and former Chegg employees.
Researchers Find Vulnerabilities in Popular Remote Learning Plug-ins
News  |  4/30/2020  | 
As more students move to online learning platforms, vulnerability researchers are revealing security flaws in some common software plug-ins.
The Rise of Deepfakes and What That Means for Identity Fraud
Commentary  |  4/30/2020  | 
Convincing deepfakes are a real concern, but there are ways of fighting back.
Average Ransomware Payments Soared in the First Quarter
News  |  4/29/2020  | 
Criminals extorting large amounts of money from big enterprises pulled up the overall average significantly compared with the fourth quarter of 2019, Coveware says.
86% of Companies Report Network Disruption Amid Remote Work Shift
News  |  4/29/2020  | 
Nearly two-thirds say disruptions were at least moderate in severity, and more have seen VPN connectivity issues as employees work from home.
7 Secure Remote Access Services for Today's Enterprise Needs
Slideshows  |  4/29/2020  | 
Secure remote access is a "must" for enterprise computing today, and there are options for you to explore in the dynamic current environment.
Microsoft Warns of Malware Hidden in Pirated Film Files
Quick Hits  |  4/29/2020  | 
An active campaign inserts malicious VBScript into ZIP files posing as downloads for "John Wick 3," "Contagion," and other popular movies.
7 Fraud Predictions in the Wake of the Coronavirus
Commentary  |  4/29/2020  | 
It's theme and variations in the fraud world, and fraudsters love -- and thrive -- during chaos and confusion
Web Shells Continue to Threaten
News  |  4/29/2020  | 
A decade after their first use, Web shells remain a common tool for all stripes of attackers, from common cybercriminals to sophisticated state actors.
Phishers Start to Exploit Oil Industry Amid COVID-19 Woes
News  |  4/29/2020  | 
While a massive flood of attacks has yet to materialize, cybersecurity experts say this could be the calm before the storm.
4 Ways to Get to Defensive When Faced by an Advanced Attack
Commentary  |  4/29/2020  | 
To hold your own against nation-state-grade attacks, you must think and act differently.
Continued Use of Python 2 Will Heighten Security Risks
News  |  4/28/2020  | 
With support for the programming language no longer available, organizations should port to Python 3, security researches say.
Rapid7 Announces Plan to Buy DivvyCloud
Quick Hits  |  4/28/2020  | 
The purchase will boost Rapid7's multicloud capabilities.
5-Year-Long Cyber Espionage Campaign Hid in Google Play
News  |  4/28/2020  | 
OceanLotus targeted Android devices in the so-called PhantomLance campaign.
5 Big Lessons from the Work-from-Home SOC
Commentary  |  4/28/2020  | 
Accustomed to working in the same room, security teams now must find ways to operate effectively in the new remote reality.
Increased Credential Threats in the Age of Uncertainty
Commentary  |  4/28/2020  | 
Three things your company should do to protect credentials during the coronavirus pandemic.
Security Pros Reassigned to IT Tasks in Coronavirus Pandemic
Quick Hits  |  4/28/2020  | 
Most security practitioners surveyed say their job functions have changed during the pandemic, and 90% are now working remotely full time.
What's Your Cybersecurity Architecture Integration Business Plan?
Commentary  |  4/28/2020  | 
To get the most out of your enterprise cybersecurity products, they need to work together. But getting those products talking to each other isn't easy.
New Startup Accurics Tackles Cloud Infrastructure Security
News  |  4/28/2020  | 
Accurics offers a free product to prevent "drift" between infrastructure defined through code and infrastructure running in the cloud.
Biopharmaceutical Firm Suffers Ransomware Attack, Data Dump
Quick Hits  |  4/27/2020  | 
ExecuPharm said its internal servers were hit with ransomware after attackers launched a phishing attack.
Top 10 Cyber Incident Response Mistakes and How to Avoid Them
Slideshows  |  4/27/2020  | 
From lack of planning to rushing the closure of incidents, these mistakes seriously harm IR effectiveness.
Attackers Target Sophos Firewalls with Zero-Day
News  |  4/27/2020  | 
Remote exploit compromises specific configurations of XG firewalls with the intent of stealing data from the devices.
Microsoft Patches Dangerous Teams Vulnerability
News  |  4/27/2020  | 
CyberArk says issue would have allowed attackers to take over Teams accounts using a malicious GIF.
Microsoft Advisory Warns of Vulnerabilities Affecting Office
Quick Hits  |  4/27/2020  | 
The flaws exist in Autodesk's FBX Software Development Kit, which is supported in Microsoft Office 2019 and Office 365 ProPlus.
Cloud Services Are the New Critical Infrastructure. Can We Rely on Them?
Commentary  |  4/27/2020  | 
If cloud services vendors successfully asked themselves these three questions, we'd all be better off.
COVID-19 Quarantine: A Unique Learning Opportunity for Defenders
Commentary  |  4/27/2020  | 
Use these spare moments at home to master new skills that will help protect your organization and enhance your career.
Health Prognosis on the Security of IoMT Devices? Not Good
News  |  4/25/2020  | 
As more so-called Internet of Medical Things devices go online, hospitals and medical facilities face significant challenges in securing them from attacks that could endanger patients' lives.
WHO Confirms Email Credentials Leak
News  |  4/24/2020  | 
Washington Post had identified the group as one among several whose passwords and emails were dumped online and abused.
MSI Utility Vulnerability Based on Missing Quotation Marks
News  |  4/24/2020  | 
The lack of quotation marks in the way a service called an application left MSI computers open to persistent privilege escalation attacks.
Apple Downplays Threat Posed by Newly Disclosed Zero-Days in iOS
News  |  4/24/2020  | 
Bugs don't pose an immediate threat, and there is no evidence they were exploited, as ZecOps claimed earlier this week, Apple says.
Cybercrime Group Steals $1.3M from Banks
News  |  4/24/2020  | 
A look at how the so-called Florentine Banker Group lurked for two months in a sophisticated business email compromise attack on Israeli and UK financial companies.
Find Your Framework: Thinking Fast and Slow
Commentary  |  4/24/2020  | 
Economist Daniel Kahneman's classic book has lessons for those in security, especially now.
Sextortion Campaigns Net Cybercriminals Nearly $500K in Five Months
News  |  4/24/2020  | 
Tracking the cryptocurrency paid by victims finds that, even with a low rate of payout, the scheme netted a cool half million for the various groups involved.
Narrow the Scope of Compliance
Commentary  |  4/24/2020  | 
Many organizations are doing more than they need regarding compliance.
Why Consumers, SMBs Are Likely to Fall for Coronavirus Scams
News  |  4/23/2020  | 
Data reveals both a lack of skepticism and a willingness to engage with emails crafted to seem like government communications.
Paay Misconfiguration Leaves Transaction Data Exposed
Quick Hits  |  4/23/2020  | 
The New York-based credit-card processor left a server without password protection for approximately three weeks.
How the Dark Web Fuels Insider Threats
Commentary  |  4/23/2020  | 
New decentralized, criminal marketplaces and "as-a-service" offerings make it easy for employees to monetize their knowledge and access to enterprise networks and systems.
Communication, Cloud & Finance Apps Most Vulnerable to Insider Threat
Quick Hits  |  4/23/2020  | 
Businesses say customer data, financial data, and intellectual property are the types of data most vulnerable to insider attacks.
Resiliency: The Trait National Sporting Leagues Share with Security & IT Teams
Commentary  |  4/23/2020  | 
During unprecedented times such as these, both businesses and professional sports are forced to go back to basics.
Demand for Cybersecurity Jobs Declines But Still Outperforms Other Sectors
News  |  4/23/2020  | 
While companies are cutting back on plans to hire, cybersecurity and the technology industry as a whole are doing better than the general economy.
White-Hat Hackers Help 'Fold' COVID-19 Proteins
News  |  4/23/2020  | 
A grassroots effort provides scientists with computing power to help simulate the novel coronavirus' proteins and come up with therapeutic solutions for the disease.
The Evolving Threat of Credential Stuffing
Commentary  |  4/23/2020  | 
Bots' swerve to focus on APIs means businesses must take the threat seriously and take effective action.
Attackers Prefer Ransomware to Stealing Data
News  |  4/22/2020  | 
Financial data is still in demand, but ransomware becomes the most popular way to try to cash in from compromised companies, according to Trustwave.
IBM Cloud Data Shield Brings Confidential Computing to Public Cloud
News  |  4/22/2020  | 
The Cloud Data Shield relies on confidential computing, which protects data while it's in use by enterprise applications.
Apple iOS Zero-Day Vulnerabilities Exploited in Targeted Attacks
News  |  4/22/2020  | 
One of the flaws is remotely exploitable with no user interaction needed, ZecOps says.
NSA Issues Guidance for Combating Web Shell Malware
Quick Hits  |  4/22/2020  | 
The US intelligence agency teamed up with Australian Signals Directorate in newly released information on how to protect Web servers from the malware.
Page 1 / 4   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32813
PUBLISHED: 2021-08-03
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however...
CVE-2020-19303
PUBLISHED: 2021-08-03
An arbitrary file upload vulnerability in /fileupload.php of hdcms 5.7 allows attackers to execute arbitrary code via a crafted file.
CVE-2020-19304
PUBLISHED: 2021-08-03
An issue in /admin/index.php?n=system&c=filept&a=doGetFileList of Metinfo v7.0.0 allows attackers to perform a directory traversal and access sensitive information.
CVE-2020-19305
PUBLISHED: 2021-08-03
An issue in /app/system/column/admin/index.class.php of Metinfo v7.0.0 causes the indeximg parameter to be deleted when the column is deleted, allowing attackers to escalate privileges.
CVE-2021-33335
PUBLISHED: 2021-08-03
Privilege escalation vulnerability in Liferay Portal 7.0.3 through 7.3.4, and Liferay DXP 7.1 before fix pack 20, and 7.2 before fix pack 9 allows remote authenticated users with permission to update/edit users to take over a company administrator user account by editing the company administrator us...