Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in November 2015
State & Local Government Hit By Malware, Ransomware More Than SMBs
News  |  11/30/2015  | 
Localities and education networks suffered twice as many infections of the infamous CyptoWall ransomware than other sectors.
How Facebook Bakes Security Into Corporate Culture
Commentary  |  11/30/2015  | 
Security is everyone's responsibility at the famous social network. These five ingredients are what make up the secret sauce.
Security Geek Gift Guide
Slideshows  |  11/30/2015  | 
Whether you're looking for a gift to give at the IT department's holiday party, for your science-loving kids, or for a genuine friend in the cube beside you, these gifts are sure winners.
Hilton Data Breach Focuses Attention On Growing POS Malware Threat
News  |  11/25/2015  | 
Analysts expect an increase in POS attacks against retailers and others during this holiday shopping season.
The Youthful Side Of Hacking
Commentary  |  11/25/2015  | 
If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
Cyber Monday: What Retailers & Shoppers Should Watch For
News  |  11/24/2015  | 
Attackers have a variety of ways to commit fraud and may take advantage of busy time to sneak in a data breach.
RSA Warns Of Zero Detection Trojan
News  |  11/24/2015  | 
GlassRAT has remained undetected for more than three years while stealthily targeting victims, security firm says.
Stealthy ModPOS Is 'Most Sophisticated PoS Malware' Ever
News  |  11/24/2015  | 
More than just a point-of-sale card scraper, it's modular malware, and every module is a rootkit.
Dell Hands Hackers Keys To Customer Systems
News  |  11/24/2015  | 
Dell installs root certificate with associated private keys to create its very own Superfish scenario.
Black Friday Security: Brick-and-Mortar Retailers Have Cyber Threats, Too
News  |  11/23/2015  | 
PoS malware, ways to trick new payment technology, and zero tolerance for down-time or slow-time make for a stressful combination.
A Comprehensive Look At China's Cybercrime Culture
News  |  11/23/2015  | 
Trend Micro report offers a full view of espionage and theft perpetrated by Chinese hackers.
Where Is Ransomware Going?
Partner Perspectives  |  11/23/2015  | 
As PCs and servers get better protected and employees more knowledgeable about the ransomware threat, criminals will go after less secure systems such as smart TVs, conferencing equipment, or other unsecured devices.
Russian Cybergangs Stole Some $790 Million Over 3 Years
News  |  11/20/2015  | 
More than $500 million of that is from victims located outside the borders of the former USSR, Kaspersky Lab reveals.
Introducing RITA for Real Intelligence Threat Analysis
Commentary  |  11/20/2015  | 
SANS' free, new framework can help teams hunt for attackers by extending traditional signature analysis to blacklisted IP addresses and accounts that have multiple concurrent logons to multiple systems.
Why The Java Deserialization Bug Is A Big Deal
News  |  11/19/2015  | 
Millions of app servers are potentially open to compromise due to how they handle serialized Java apps, researchers say.
4 Tricks For Getting The Most Out Of User Behavior Analytics
News  |  11/19/2015  | 
First thing's first: establish what 'normal' metrics look like.
US-China Security Review Commission Discusses 'Hack-Back' Laws
Quick Hits  |  11/19/2015  | 
Commission's annual report to Congress recommends a closer look at whether companies should be allowed to launch counterattacks on hackers.
And Now, A Cyber Arms Race Towards Critical Infrastructure Attacks
Commentary  |  11/19/2015  | 
As traditional explosives give way to 'logic bombs,' the need to protect our industrial networks and systems has never been more important.
Siris Lockscreen Bypass A Growing Privacy Issue For iOS Users
News  |  11/18/2015  | 
In less than 30 seconds, anyone with access to an Apple iPhone or iPad can extract a lot of personal data using Siri, Trend Micro says.
Attack Attempt Numbers Down, But PoS Malware & Angler Up in Q3
News  |  11/17/2015  | 
Politically motivated cyberespionage groups also hard at work between July and September, according to Trend Micro.
IBM Report: Ransomware, Malicious Insiders On The Rise
News  |  11/16/2015  | 
X-Force's top four cyber threat trends also names upper management's increasing interest in infosec.
Dont Toy With The Dark Web, Harness It
Commentary  |  11/16/2015  | 
The Dark Webs sinister allure draws outsized attention, but time-strapped security teams would benefit from knowing what's already circulating in places they don't need Tor or I2P to find.
More Ransomware Being Spread Via Malvertising
Quick Hits  |  11/13/2015  | 
Magnitude exploit kit has popped up in new malvertising campaign and dropping CryptoWall.
Cherry Picker POS Malware Has Remained Hidden For Four Years
News  |  11/12/2015  | 
Sophisticated obfuscation techniques have allowed malware to evade AV systems and security vendors for a long time, says Trustwave.
Solving Security: If You Want Something New, Stop Doing Something Old
News  |  11/12/2015  | 
Black Hat Europe keynoter Haroon Meer tells security pros to work smarter, think out of the box, and speak out to the C-suite.
Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
Commentary  |  11/11/2015  | 
Guided by an organization's internal security experts,'algorithmic assistants' provide a powerful new way to find anomalies and patterns for detecting cyberthreat activity.
Adobe Flash Bug Discovery Leads To New Attack Mitigation Method
News  |  11/10/2015  | 
Prototype aims to prevent exploits that employ 'use after free' bugs in Windows, Linux, OS X software.
Why Threat Intelligence Feels Like A Game Of Connect Four
Commentary  |  11/10/2015  | 
In real life, solving the cybersecurity puzzle has many challenges. But shared wisdom and community defense models are making it easier to connect the dots.
NSA Discloses 91 Percent Of Vulns It Finds, But How Quickly?
News  |  11/9/2015  | 
NSA says 'vast majority' of flaws it finds are reported to vendors, but keeps mum on how long it takes--offering enterprises another reason for remaining vigilant with their own internal security.
6 Critical SAP HANA Vulns Can't Be Fixed With Patches
News  |  11/9/2015  | 
Onapsis releases 21 SAP HANA security advisories, including some Trexnet vulnerabilities that require upgrades and reconfigurations.
What Flu Season Can Teach Us About Fighting Cyberattacks
Commentary  |  11/6/2015  | 
Cybersecurity doesn't have to be an arms race towards complexity if we put people front and center of the solution.
States Cybersecurity Readiness Presents Grim Picture Pell Study Finds
News  |  11/6/2015  | 
Just eight states of 50 fared decently in a Pell study on their preparedness to deal with current and emerging cyberthreats.
CryptoWall 4.0 A Stealthier, More Sweet-Talking Ransomware
News  |  11/5/2015  | 
Less 'gimme all your money,' more 'please buy this software package.'
Vulnerable Coffee Machine Demonstrates Brewing Security Challenges Of IoT
News  |  11/5/2015  | 
Researchers examined four mobile-app controlled home devices and found vulnerabilities in every single one of them.
Drone Detection As The New 'IDS'
News  |  11/4/2015  | 
ISS founder Noonan's latest venture aims to detect drone-based cyberattacks, which so far have been mostly a project of the research domain.
AndroBugs: A Framework For Android Vulnerability Scanning
News  |  11/4/2015  | 
At Black Hat Europe next week, a researcher will present a framework he says is more systematic than the vulnerability scanners popping up on the market.
BYOD 2015: Data Loss, Data Leaks & Data Breaches
Commentary  |  11/4/2015  | 
The growth of employee-owned devices in the workplace is placing new demands on enterprises struggling to protect both personal and professional data.
The Evolving Security Budget: 3 New Ways CISOs Prioritize Spending
News  |  11/4/2015  | 
New report shows increased spending and shifting priorities
XCodeGhost Found Hiding In U.S. And In Apple iOS 9 Apps
News  |  11/3/2015  | 
Meanwhile, exploit broker Zerodium says it's paid a $1 million bounty for a remote iOS 9 zero-day.
Kicking Off A New Era For Policing Cybersecurity
Commentary  |  11/3/2015  | 
In the wake of FTC v. Wyndham, government agencies are becoming more aggressive about protecting corporate data and customer privacy. But the new rules are very much a work in progress.
Mobile Malware Makes Mobile Banking Treacherous
News  |  11/2/2015  | 
Kaspersky Lab report shows rate of mobile malware occurrence exploding in Q3.
IPv6 And The Growing DDoS Danger
Commentary  |  11/2/2015  | 
IPv6 and the Internet of Things have arrived -- and with them an enormous potential expansion for distributed denial-of-service (DDoS) attacks.


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19071
PUBLISHED: 2019-11-18
A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
CVE-2019-19072
PUBLISHED: 2019-11-18
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
CVE-2019-19073
PUBLISHED: 2019-11-18
Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, ...
CVE-2019-19074
PUBLISHED: 2019-11-18
A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
CVE-2019-19075
PUBLISHED: 2019-11-18
A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.