Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Vulnerabilities / Threats
Page 1 / 2   >   >>
CISA Launches New Threat Detection Dashboard
Quick Hits  |  4/9/2021  | 
Aviary is a new dashboard that works with CISA's Sparrow threat detection tool.
Unofficial Android App Store APKPure Infected With Malware
Quick Hits  |  4/9/2021  | 
The APKPure app store was infected with malware that can download Trojans to other Android devices, researchers report.
Zoom Joins Microsoft Teams on List of Enterprise Tools Hacked at Pwn2Own
News  |  4/8/2021  | 
White-hat hacking event shows yet again why there's no such thing as foolproof security against modern attacks.
Fraudsters Use HTML Legos to Evade Detection in Phishing Attack
Quick Hits  |  4/8/2021  | 
Criminals stitch pieces of HTML together and hide them in JavaScript files, researchers report.
Handcuffs Over AI: Solving Security Challenges With Law Enforcement
Commentary  |  4/8/2021  | 
We've tried everything else ... now it's time to make the prospect of getting caught -- and punished -- a real deterrent to cybercrime.
Voice-Changing Software Found on APT Attackers' Server
Quick Hits  |  4/7/2021  | 
Security researchers believe the presence of Morph Vox Pro could indicate APT-C-23 has new plans for their phishing campaigns.
Cring Ransomware Used in Attacks on European Industrial Firms
Quick Hits  |  4/7/2021  | 
Attackers exploited a vulnerability in Fortigate VPN servers to gain access to target networks, researchers report.
Fortune 500 Security Shows Progress and Pitfalls
News  |  4/7/2021  | 
Fortune 500 companies have improved on email security and vulnerability disclosure programs but struggle in asset management and high-risk services.
Rethinking Cyberattack Response: Prevention & Preparedness
Commentary  |  4/7/2021  | 
The SolarWinds incident is the starkest reminder yet that complacency can exact a terrible price.
5 Ways to Transform Your Phishing Defenses Right Now
Commentary  |  4/7/2021  | 
By transforming how you approach phishing, you can break the phishing kill chain and meaningfully reduce your business risk.
Cartoon Caption Winner: Something Seems Afoul
Commentary  |  4/7/2021  | 
And the winner of Dark Readings's March cartoon caption contest is ...
Microsoft Teams, Exchange Server, Windows 10 Hacked in Pwn2Own 2021
Quick Hits  |  4/6/2021  | 
The 2021 Pwn2Own is among the largest in its history, with 23 separate entries targeting 10 products.
Security Falls Short in Rapid COVID Cloud Migration
Quick Hits  |  4/6/2021  | 
The quick pivot to the cloud for remote support also ushered in risks.
Crime Service Gives Firms Another Reason to Purge Macros
News  |  4/6/2021  | 
Recent Trickbot campaigns and at least three common banking Trojans all attempt to infect systems using malicious macros in Microsoft Office documents created using EtterSilent.
Ryuk's Rampage Has Lessons for the Enterprise
Commentary  |  4/6/2021  | 
The Ryuk ransomware epidemic is no accident. The cybercriminals responsible for its spread have systematically exploited weaknesses in enterprise defenses that must be addressed.
NFT Thefts Reveal Security Risks in Coupling Private Keys & Digital Assets
Commentary  |  4/6/2021  | 
Compromised NFT accounts highlight security concerns inherent in the design of centralized systems.
LinkedIn Phishing Ramps Up With More-Targeted Attacks
News  |  4/5/2021  | 
Seeking to take advantage of out-of-work users, malware groups continue to use LinkedIn and business services to offer fictional jobs and deliver infections instead.
Kaspersky Uncovers New APAC Cyberespionage Campaign
Quick Hits  |  4/5/2021  | 
A group related to Chinese-speaking threat group Cycldek is targeting government and military organizations in Vietnam.
Data from 553 Million Facebook Accounts Leaked Online
Quick Hits  |  4/5/2021  | 
Personal information belonging to more than 533 million Facebook users was found available on a cybercrime forum.
7 Ways to Reduce Cyber Threats From Remote Workers
Commentary  |  4/5/2021  | 
The pandemic's decline won't stop the work-from-home trend nor the implications for cybersecurity, so it's crucial to minimize the threats.
Inside the Ransomware Campaigns Targeting Exchange Servers
News  |  4/2/2021  | 
Security experts discuss the ransomware campaigns taking aim at Microsoft Exchange Server vulnerabilities patched last month.
Hackers Demand $40M in Ransom From Florida School District
Quick Hits  |  4/2/2021  | 
District officials say they have no intention of paying the ransom
FBI & CISA Warn of Active Attacks on FortiOS Vulnerabilities
Quick Hits  |  4/2/2021  | 
A joint advisory warns admins of the likelihood of APT groups exploiting three vulnerabilities in the Fortinet FortiOS.
US Tech Dominance Rides on Securing Intellectual Property
Commentary  |  4/2/2021  | 
A recent, mostly overlooked pardon points to a big problem in the US tech industry: Intellectual property offers a lucrative golden ticket for insiders.
Enterprises Remain Riddled With Overprivileged Users -- and Attackers Know It
News  |  4/1/2021  | 
Attackers commonly focus on finding users with too much privileged access as their ticket to network compromise. What can companies do?
7 Security Strategies as Employees Return to the Office
Slideshows  |  4/1/2021  | 
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal.
NIST Publishes Guide for Securing Hotel Property Management Systems
Quick Hits  |  4/1/2021  | 
These sensitive systems store guests' personal data and payment-card information.
The Role of Visibility in Securing Cloud Applications
Commentary  |  4/1/2021  | 
Traditional data center approaches aren't built for securing modern cloud applications.
Google Updates on Campaign Targeting Security Researchers
Quick Hits  |  3/31/2021  | 
Attackers linked to North Korea began to target security researchers on social media earlier this year.
83% of Businesses Hit With a Firmware Attack in Past Two Years
News  |  3/31/2021  | 
A new Microsoft-commissioned report finds less than 30% of organizations allocate security budget toward preventing firmware attacks.
College Students Targeted in Newest IRS Scam
Quick Hits  |  3/31/2021  | 
The Internal Revenue Service warns of fraudulent emails sent to .edu addresses.
Advice From Security Experts: How to Approach Security in the New Normal
Commentary  |  3/31/2021  | 
Here are the biggest lessons they've learned after a year of work from home, and how they advise their counterparts at organizations to proceed as a result of those lessons.
3 Ways Vendors Can Inspire Customer Trust Amid Breaches
Commentary  |  3/31/2021  | 
As customers rely more on cloud storage and remote workforces, the probability of a breach increases.
Weakness in EDR Tools Lets Attackers Push Malware Past Them
News  |  3/31/2021  | 
A technique called hooking used by most endpoint detection and response products to monitor running processes can be abused, new research shows.
What We Know (and Don't Know) So Far About the 'Supernova' SolarWinds Attack
News  |  3/30/2021  | 
A look at the second elusive attack targeting SolarWinds software that researchers at Secureworks recently cited as the handiwork of Chinese nation-state hackers.
White Ops Renames Company 'Human'
Quick Hits  |  3/30/2021  | 
The company first confirmed plans to change its name in October 2020.
Watch Out for These Cyber-Risks
Commentary  |  3/30/2021  | 
It's difficult to predict what will materialize in the months ahead in terms of cyber-risks, which is why it's wise to review your organization's security posture now.
Ghost Users Haunt Healthcare Firms
Quick Hits  |  3/30/2021  | 
Data security hygiene severely lacking among healthcare firms, new research shows.
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Commentary  |  3/30/2021  | 
The Cyber Kill Chain and MITRE ATT&CK are popular reference frameworks to analyze breaches, but amid the rise of XDR, we may need a new one.
In the Rush to Embrace Hybrid Cloud, Don't Forget About Security
Commentary  |  3/30/2021  | 
Cloud service providers typically only secure the infrastructure itself, while customers are responsible for their data and application security.
Attackers Target PHP Git Server to Backdoor Source Code
Quick Hits  |  3/29/2021  | 
The PHP maintainers have decided to make GitHub the official source for PHP repositories going forward.
SolarWinds Hackers Accessed DHS Chief's Email
Quick Hits  |  3/29/2021  | 
Several high-level government accounts were also breached in the attack.
CISA Builds Out Defensive Tools for Security Teams
News  |  3/29/2021  | 
Need a tool to hunt for attacks in your network? The DHS agency bolsters the offerings in its open source toolbox.
SolarWinds Experimenting With New Software Build System in Wake of Breach
News  |  3/26/2021  | 
CISO of SolarWinds now has complete autonomy to stop product releases if security concerns exist, CEO says.
40% of Apps Leaking Information
Quick Hits  |  3/26/2021  | 
Apps in manufacturing most at risk, according to WhiteHat Security.
Apple Patches iOS Zero-Day
Quick Hits  |  3/26/2021  | 
Apple today released iOS 14.4.2 to address a security vulnerability that may have been actively exploited.
Microsoft Shares Exchange Server Post-Compromise Attack Activity
News  |  3/26/2021  | 
Microsoft shares the details of post-exploitation attack activity, including multiple ransomware payloads and a cryptocurrency botnet.
Moving from DevOps to CloudOps: The Four-Box Problem
Commentary  |  3/26/2021  | 
With SOC teams running services on multiple cloud platforms, their big concern is how to roll up configuration of 200+ servers in a comprehensive way.
Exec Order Could Force Software Vendors to Disclose Breaches to Federal Gov't Customers
Quick Hits  |  3/25/2021  | 
A decision on the order, which contains several recommendations, is still forthcoming.
Nearly Half of Popular Android Apps Built With High-Risk Components
News  |  3/25/2021  | 
Information leakage and applications asking for too many permissions were also major issues, according to a survey of more than 3,300 popular mobile applications.
Page 1 / 2   >   >>


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.