Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in July 2021
Page 1 / 2   >   >>
8 Security Tools to be Unveiled at Black Hat USA
Slideshows  |  7/28/2021  | 
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
Biden Administration Responds to Geopolitical Cyber Threats
Commentary  |  7/23/2021  | 
In response to growing concerns regarding the recent uptick in large-scale, nation-state-backed ransomware attacks on critical infrastructure, the Biden administration is taking new action to tackle the evolving challenges posed by ransomware attacks.
7 Hot Cyber Threat Trends to Expect at Black Hat
Slideshows  |  7/22/2021  | 
A sneak peek of some of the main themes at Black Hat USA next month.
Law Firm for Ford, Pfizer, Exxon Discloses Ransomware Attack
Quick Hits  |  7/19/2021  | 
Campbell Conroy & O'Neil reports the attack affected personal data including Social Security numbers, passport numbers, and payment card data for some individuals.
US Accuses China of Using Criminal Hackers in Cyber Espionage Operations
News  |  7/19/2021  | 
DOJ indicts four Chinese individuals for alleged role in attacks targeting intellectual property, trade secrets belonging to defense contractors, maritime companies, aircraft service firms, and others.
NSO Group Spyware Used On Journalists & Activists Worldwide
Quick Hits  |  7/19/2021  | 
An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world.
7 Ways AI and ML Are Helping and Hurting Cybersecurity
Commentary  |  7/19/2021  | 
In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they can create significant harm.
Breaking Down the Threat of Going All-In With Microsoft Security
Commentary  |  7/19/2021  | 
Limit risk by dividing responsibility for infrastructure, tools, and security.
Researchers Create New Approach to Detect Brand Impersonation
News  |  7/16/2021  | 
A team of Microsoft researchers developed and trained a Siamese Neural Network to detect brand impersonation attacks.
Recent Attacks Lead to Renewed Calls for Banning Ransom Payments
News  |  7/16/2021  | 
While attackers in protected jurisdictions continue to get massive sums for continuing to breach organizations, the ransomware threat will only continue to grow.
4 Future Integrated Circuit Threats to Watch
Commentary  |  7/16/2021  | 
Threats to the supply chains for ICs and other computer components are poised to wreak even more havoc on organizations.
Attackers Exploited 4 Zero-Day Flaws in Chrome, Safari & IE
News  |  7/15/2021  | 
At least two government-backed actors -- including one Russian group -- used the now-patched flaws in separate campaigns, Google says.
State Dept. to Pay Up to $10M for Information on Foreign Cyberattacks
News  |  7/15/2021  | 
The Rewards for Justice program, a counterterrorism tool, is now aimed at collecting information on nation-states that use hackers to disrupt critical infrastructure.
CISA Launches New Website to Aid Ransomware Defenders
Quick Hits  |  7/15/2021  | 
StopRansomware.gov provides information to help organizations protect against, and respond to, ransomware attacks.
Microsoft: Israeli Firm's Tools Used to Target Activists, Dissidents
News  |  7/15/2021  | 
Candiru sold spyware that exploited Windows vulnerabilities and had been used in attacks against dissidents, activists, and journalists.
IoT-Specific Malware Infections Jumped 700% Amid Pandemic
Quick Hits  |  7/15/2021  | 
Gafgyt and Mirai malware represented majority of IoT malware, new data from Zscaler shows.
How to Bridge On-Premises and Cloud Identity
Commentary  |  7/15/2021  | 
Identity fabric, a cloud-native framework, removes the need for multiple, siloed, proprietary identity systems.
What to Look for in an Effective Threat Hunter
Commentary  |  7/15/2021  | 
The most important personality traits, skills, and certifications to look for when hiring a threat hunting team.
SonicWall: 'Imminent' Ransomware Attack Targets Older Products
Quick Hits  |  7/14/2021  | 
The attack exploits a known vulnerability that was fixed in new versions of firmware released this year.
Google to Bring HTTPS-First Mode to Chrome Browser
Quick Hits  |  7/14/2021  | 
Beginning in M94, Chrome will offer HTTPS-First Mode, which will attempt to upgrade all page loads to HTTPS.
Targeted Attack Activity Heightens Need for Orgs. to Patch New SolarWinds Flaw
News  |  7/14/2021  | 
A China-based threat actor -- previously observed targeting US defense industrial base organizations and software companies -- is exploiting the bug in SolarWinds' Serv-U software, Microsoft says.
Did the Cybersecurity Workforce Gap Distract Us From the Leak?
Commentary  |  7/14/2021  | 
Cyber games can play a critical role in re-engaging our workforce and addressing the employee retention crisis.
4 Integrated Circuit Security Threats and How to Protect Against Them
Commentary  |  7/14/2021  | 
Little-understood threats involving the IC supply chain are putting organizations around the world at risk.
New Phishing Campaign Targets Individuals of Interest to Iran
News  |  7/13/2021  | 
TA453 group spoofed two scholars at University of London to try and gain access to email inboxes belonging to journalists, think tank personnel, academics, and others, security vendor says.
Microsoft Patches 3 Windows Zero-Days Amid 117 CVEs
News  |  7/13/2021  | 
The July Patch Tuesday release also includes the out-of-band fix for the Windows Print Spooler remote code execution flaw under attack.
DoD-Validated Data Security Startup Emerges From Stealth
Quick Hits  |  7/13/2021  | 
The Code-X platform has been tested by the US Department of Defense and members of the intelligence community.
Why We Need to Raise the Red Flag Against FragAttacks
Commentary  |  7/13/2021  | 
Proliferation of wireless devices increases the risk that corporate networks will be attacked with this newly discovered breed of Wi-Fi-based cyber assault.
Can Government Effectively Help Businesses Fight Cybercrime?
News  |  7/13/2021  | 
From the Biden administration's pledge to take action to INTERPOL's focus on ransomware as a global threat, governments are looking to help businesses cope with cyberattacks. But can it really work?
The Trouble With Automated Cybersecurity Defenses
Commentary  |  7/13/2021  | 
While there's enormous promise in AI-powered tools and machine learning, they are very much a double-edged sword.
Tool Sprawl & False Positives Hold Security Teams Back
News  |  7/13/2021  | 
Security teams spend as much time addressing false positive alerts as they do addressing actual cyberattacks, survey data shows.
SolarWinds Discloses Zero-Day Under Active Attack
Quick Hits  |  7/12/2021  | 
The company confirms this is a new vulnerability that is not related to the supply chain attack discovered in December 2020.
Microsoft Confirms Acquisition of RiskIQ
Quick Hits  |  7/12/2021  | 
RiskIQ's technology helps businesses assess their security across the Microsoft cloud, Amazon Web Services, other clouds, and on-premises.
Kaseya Releases Security Patch as Companies Continue to Recover
News  |  7/12/2021  | 
Estimates indicate the number of affected companies could grow, while Kaseya faces renewed scrutiny as former employees reportedly criticize its lack of focus on security.
AI and Cybersecurity: Making Sense of the Confusion
Commentary  |  7/12/2021  | 
Artificial intelligence is a maturing area in cybersecurity, but there are different concerns depending on whether you're a defender or an attacker.
How Dangerous Is Malware? New Report Finds It's Tough to Tell
Quick Hits  |  7/9/2021  | 
Determining which malware is most damaging, and worthy of immediate attention, has become difficult in environments filled with alerts and noise.
CISA Analysis Reveals Successful Attack Techniques of FY 2020
Quick Hits  |  7/9/2021  | 
The analysis shows potential attack paths and the most effective techniques for each tactic documented in CISA's Risk and Vulnerability Assessments.
New Framework Aims to Describe & Address Complex Social Engineering Attacks
News  |  7/9/2021  | 
As attackers use more synthetic media in social engineering campaigns, a new framework is built to describe threats and provide countermeasures.
It's in the Game (but It Shouldn't Be)
Commentary  |  7/9/2021  | 
Five ways that game developers (and others) can avoid falling victim to an attack like the one that hit EA.
Cartoon Caption Winner: Sight Unseen
Commentary  |  7/9/2021  | 
And the winner of Dark Reading's June contest is ...
Morgan Stanley Discloses Data Breach
Quick Hits  |  7/8/2021  | 
Attackers were able to compromise customers' personal data by targeting the Accellion FTA server of a third-party vendor.
New WildPressure Malware Capable of Targeting Windows and MacOS
Quick Hits  |  7/8/2021  | 
The Trojan sends information back to the attackers' servers about the programming language of a target device.
Kaseya Hacked via Authentication Bypass
Commentary  |  7/8/2021  | 
The Kaseya ransomware attack is believed to have been down to an authentication bypass. Yes, ransomware needs to be on your radar -- but good authentication practices are also imperative.
What Colonial Pipeline Means for Commercial Building Cybersecurity
Commentary  |  7/8/2021  | 
Banks and hospitals may be common targets, but now commercial real estate must learn to protect itself against stealthy hackers.
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
News  |  7/7/2021  | 
Automation allowed a REvil affiliate to move from exploitation of vulnerable servers to installing ransomware on downstream companies faster than most defenders could react.
Fake Android Apps Promise Cryptomining Services to Steal Funds
Quick Hits  |  7/7/2021  | 
Researchers discover more than 170 Android apps that advertise cloud cryptocurrency mining services and fail to deliver.
Sophos Acquires Capsule8 for Linux Server & Container Security
Quick Hits  |  7/7/2021  | 
The deal was announced the same day ZeroFox bought Dark Web intelligence firm Vigilante as a wave of security M&A continues.
Are Security Attestations a Necessity for SaaS Businesses?
Commentary  |  7/7/2021  | 
Are security attestations becoming business imperatives, or are they merely token additions on the list of regulatory requirements?
Microsoft Releases Emergency Patch for 'PrintNightmare' Vuln
News  |  7/7/2021  | 
It urges organizations to immediately apply security update, citing exploit activity.
Autonomous Security Is Essential if the Edge Is to Scale Properly
Commentary  |  7/7/2021  | 
Service demands at the network edge mean customers need to get cost, performance, and security right.
Researchers Learn From Nation-State Attackers' OpSec Mistakes
News  |  7/6/2021  | 
Security researchers discuss how a series of simple and consistent mistakes helped them learn more about ITG18, better known as Charming Kitten.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21742
PUBLISHED: 2021-09-25
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.
CVE-2020-20508
PUBLISHED: 2021-09-24
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
CVE-2020-20514
PUBLISHED: 2021-09-24
A Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/<id>.html allows authenticated attackers to delete all users.
CVE-2016-6555
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the events list page. This issue was fixed in ver...
CVE-2016-6556
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when a user of the web UI views the data. This iss...