Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in November 2015
State & Local Government Hit By Malware, Ransomware More Than SMBs
News  |  11/30/2015  | 
Localities and education networks suffered twice as many infections of the infamous CyptoWall ransomware than other sectors.
How Facebook Bakes Security Into Corporate Culture
Commentary  |  11/30/2015  | 
Security is everyone's responsibility at the famous social network. These five ingredients are what make up the secret sauce.
Security Geek Gift Guide
Slideshows  |  11/30/2015  | 
Whether you're looking for a gift to give at the IT department's holiday party, for your science-loving kids, or for a genuine friend in the cube beside you, these gifts are sure winners.
Hilton Data Breach Focuses Attention On Growing POS Malware Threat
News  |  11/25/2015  | 
Analysts expect an increase in POS attacks against retailers and others during this holiday shopping season.
The Youthful Side Of Hacking
Commentary  |  11/25/2015  | 
If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
Cyber Monday: What Retailers & Shoppers Should Watch For
News  |  11/24/2015  | 
Attackers have a variety of ways to commit fraud and may take advantage of busy time to sneak in a data breach.
RSA Warns Of Zero Detection Trojan
News  |  11/24/2015  | 
GlassRAT has remained undetected for more than three years while stealthily targeting victims, security firm says.
Stealthy ModPOS Is 'Most Sophisticated PoS Malware' Ever
News  |  11/24/2015  | 
More than just a point-of-sale card scraper, it's modular malware, and every module is a rootkit.
Dell Hands Hackers Keys To Customer Systems
News  |  11/24/2015  | 
Dell installs root certificate with associated private keys to create its very own Superfish scenario.
Black Friday Security: Brick-and-Mortar Retailers Have Cyber Threats, Too
News  |  11/23/2015  | 
PoS malware, ways to trick new payment technology, and zero tolerance for down-time or slow-time make for a stressful combination.
A Comprehensive Look At China's Cybercrime Culture
News  |  11/23/2015  | 
Trend Micro report offers a full view of espionage and theft perpetrated by Chinese hackers.
Where Is Ransomware Going?
Partner Perspectives  |  11/23/2015  | 
As PCs and servers get better protected and employees more knowledgeable about the ransomware threat, criminals will go after less secure systems such as smart TVs, conferencing equipment, or other unsecured devices.
Russian Cybergangs Stole Some $790 Million Over 3 Years
News  |  11/20/2015  | 
More than $500 million of that is from victims located outside the borders of the former USSR, Kaspersky Lab reveals.
Introducing RITA for Real Intelligence Threat Analysis
Commentary  |  11/20/2015  | 
SANS' free, new framework can help teams hunt for attackers by extending traditional signature analysis to blacklisted IP addresses and accounts that have multiple concurrent logons to multiple systems.
Why The Java Deserialization Bug Is A Big Deal
News  |  11/19/2015  | 
Millions of app servers are potentially open to compromise due to how they handle serialized Java apps, researchers say.
4 Tricks For Getting The Most Out Of User Behavior Analytics
News  |  11/19/2015  | 
First thing's first: establish what 'normal' metrics look like.
US-China Security Review Commission Discusses 'Hack-Back' Laws
Quick Hits  |  11/19/2015  | 
Commission's annual report to Congress recommends a closer look at whether companies should be allowed to launch counterattacks on hackers.
And Now, A Cyber Arms Race Towards Critical Infrastructure Attacks
Commentary  |  11/19/2015  | 
As traditional explosives give way to 'logic bombs,' the need to protect our industrial networks and systems has never been more important.
Siris Lockscreen Bypass A Growing Privacy Issue For iOS Users
News  |  11/18/2015  | 
In less than 30 seconds, anyone with access to an Apple iPhone or iPad can extract a lot of personal data using Siri, Trend Micro says.
Attack Attempt Numbers Down, But PoS Malware & Angler Up in Q3
News  |  11/17/2015  | 
Politically motivated cyberespionage groups also hard at work between July and September, according to Trend Micro.
IBM Report: Ransomware, Malicious Insiders On The Rise
News  |  11/16/2015  | 
X-Force's top four cyber threat trends also names upper management's increasing interest in infosec.
Dont Toy With The Dark Web, Harness It
Commentary  |  11/16/2015  | 
The Dark Webs sinister allure draws outsized attention, but time-strapped security teams would benefit from knowing what's already circulating in places they don't need Tor or I2P to find.
More Ransomware Being Spread Via Malvertising
Quick Hits  |  11/13/2015  | 
Magnitude exploit kit has popped up in new malvertising campaign and dropping CryptoWall.
Cherry Picker POS Malware Has Remained Hidden For Four Years
News  |  11/12/2015  | 
Sophisticated obfuscation techniques have allowed malware to evade AV systems and security vendors for a long time, says Trustwave.
Solving Security: If You Want Something New, Stop Doing Something Old
News  |  11/12/2015  | 
Black Hat Europe keynoter Haroon Meer tells security pros to work smarter, think out of the box, and speak out to the C-suite.
Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
Commentary  |  11/11/2015  | 
Guided by an organization's internal security experts,'algorithmic assistants' provide a powerful new way to find anomalies and patterns for detecting cyberthreat activity.
Adobe Flash Bug Discovery Leads To New Attack Mitigation Method
News  |  11/10/2015  | 
Prototype aims to prevent exploits that employ 'use after free' bugs in Windows, Linux, OS X software.
Why Threat Intelligence Feels Like A Game Of Connect Four
Commentary  |  11/10/2015  | 
In real life, solving the cybersecurity puzzle has many challenges. But shared wisdom and community defense models are making it easier to connect the dots.
NSA Discloses 91 Percent Of Vulns It Finds, But How Quickly?
News  |  11/9/2015  | 
NSA says 'vast majority' of flaws it finds are reported to vendors, but keeps mum on how long it takes--offering enterprises another reason for remaining vigilant with their own internal security.
6 Critical SAP HANA Vulns Can't Be Fixed With Patches
News  |  11/9/2015  | 
Onapsis releases 21 SAP HANA security advisories, including some Trexnet vulnerabilities that require upgrades and reconfigurations.
What Flu Season Can Teach Us About Fighting Cyberattacks
Commentary  |  11/6/2015  | 
Cybersecurity doesn't have to be an arms race towards complexity if we put people front and center of the solution.
States Cybersecurity Readiness Presents Grim Picture Pell Study Finds
News  |  11/6/2015  | 
Just eight states of 50 fared decently in a Pell study on their preparedness to deal with current and emerging cyberthreats.
CryptoWall 4.0 A Stealthier, More Sweet-Talking Ransomware
News  |  11/5/2015  | 
Less 'gimme all your money,' more 'please buy this software package.'
Vulnerable Coffee Machine Demonstrates Brewing Security Challenges Of IoT
News  |  11/5/2015  | 
Researchers examined four mobile-app controlled home devices and found vulnerabilities in every single one of them.
Drone Detection As The New 'IDS'
News  |  11/4/2015  | 
ISS founder Noonan's latest venture aims to detect drone-based cyberattacks, which so far have been mostly a project of the research domain.
AndroBugs: A Framework For Android Vulnerability Scanning
News  |  11/4/2015  | 
At Black Hat Europe next week, a researcher will present a framework he says is more systematic than the vulnerability scanners popping up on the market.
BYOD 2015: Data Loss, Data Leaks & Data Breaches
Commentary  |  11/4/2015  | 
The growth of employee-owned devices in the workplace is placing new demands on enterprises struggling to protect both personal and professional data.
The Evolving Security Budget: 3 New Ways CISOs Prioritize Spending
News  |  11/4/2015  | 
New report shows increased spending and shifting priorities
XCodeGhost Found Hiding In U.S. And In Apple iOS 9 Apps
News  |  11/3/2015  | 
Meanwhile, exploit broker Zerodium says it's paid a $1 million bounty for a remote iOS 9 zero-day.
Kicking Off A New Era For Policing Cybersecurity
Commentary  |  11/3/2015  | 
In the wake of FTC v. Wyndham, government agencies are becoming more aggressive about protecting corporate data and customer privacy. But the new rules are very much a work in progress.
Mobile Malware Makes Mobile Banking Treacherous
News  |  11/2/2015  | 
Kaspersky Lab report shows rate of mobile malware occurrence exploding in Q3.
IPv6 And The Growing DDoS Danger
Commentary  |  11/2/2015  | 
IPv6 and the Internet of Things have arrived -- and with them an enormous potential expansion for distributed denial-of-service (DDoS) attacks.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8291
PUBLISHED: 2021-10-18
A link preview rendering issue in Rocket.Chat versions before 3.9 could lead to potential XSS attacks.
CVE-2021-21796
PUBLISHED: 2021-10-18
An exploitable use-after-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause an object containing the path to a document to be destroyed and then later reused, resulting in a use-after-free vulnerability, which can lead to code executio...
CVE-2021-21797
PUBLISHED: 2021-10-18
An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead t...
CVE-2021-22942
PUBLISHED: 2021-10-18
A possible open redirect vulnerability in the Host Authorization middleware in Action Pack >= 6.0.0 that could allow attackers to redirect users to a malicious website.
CVE-2021-22961
PUBLISHED: 2021-10-18
A code injection vulnerability exists within the firewall software of GlassWire v2.1.167 that could lead to arbitrary code execution from a file in the user path on first execution.