Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in February 2016
So You Want to Be a Security Researcher?
News  |  2/26/2016  | 
Security researchers need a broad set of skills to investigate a constantly-changing threat landscape. But specializing in areas such as reverse engineering or network forensics will boost opportunities.
Phishing Attacks Increase Tech Sophistication, Focus On Financial Fraud
News  |  2/25/2016  | 
With a prevalence of free, feature-rich phishing kits and multi-million dollar profits from business email compromise attacks, no wonder phishing's so popular.
Breach Stats: Improving From Abysmal To Just Awful
News  |  2/25/2016  | 
Breach response times and volumes decreased significantly last year, but overall numbers still look ugly.
FBI Vs. Apple: Privacy Syllabus
Slideshows  |  2/24/2016  | 
Some of the very best articles, blogs, and other opinions on the issue of government meddling in encryption technology.
Operation Dust Storm Hackers Set Sights On Japan's Critical Infrastructure
News  |  2/23/2016  | 
Japanese energy, oil/gas, and transportation industries the target of stealthy, patient cyber-espionage group.
Leaky Apps Far Riskier Than Mobile Malware
News  |  2/23/2016  | 
Even top enterprise apps are rampant with data leakage and privacy-invasive behavior.
7 Ways Banking Botnets Are Keeping With The Times
News  |  2/22/2016  | 
Banking botnets have been plaguing online bankers and financial institutions for years now, and the attacks keep evolving.
Cybercrime And Hacking Atlas
Slideshows  |  2/20/2016  | 
A geographic guide with cybercrime threat and target trends in 10 notable countries.
New Trojan Xbot A Swiss-Army Knife Of Malicious Features
News  |  2/19/2016  | 
Malware can steal banking and card info, encrypt SD cards, intercept messages and more, say researchers at Palo Alto Networks
Web Gateways Need Backstops
News  |  2/19/2016  | 
New report emphasizes the importance of layered defense.
Adding Up The Total Costs of Ransomware
Commentary  |  2/19/2016  | 
Its a lot more than just the ransom. We did the math.
Here Comes Locky, A Brand New Ransomware Threat
News  |  2/18/2016  | 
Infected Word files being used to spread ransomware, security researchers say.
The Secret Life Of Stolen Credentials
News  |  2/18/2016  | 
Bitglass Threat Research Team's Project Cumulus demonstrates what happens when Google Drive credentials are 'stolen.'
Navigating Next-Gen Endpoint Security: A Buyers Journey
Commentary  |  2/18/2016  | 
Organizations will face a market in a state of transition as they evaluate information security solutions from both new and established vendors.
5 Exploit Trends Driving Attacks Today
News  |  2/17/2016  | 
HPE Cyber Risk Report 2016 picks apart infection stats from the past year.
Glibc Flaw Affects Thousands Of Linux Apps But How Dangerous Is It?
News  |  2/17/2016  | 
The difficulty involved in exploiting flaw could mitigate some of the risk, say some security researchers.
Today's New Payment Card Security In A Nutshell
Commentary  |  2/17/2016  | 
Businesses taking their time rolling out EMV card-compatible terminals are putting their data security and financial well-being at risk.
A Not-So-Secret Secret About Cybercrime
Commentary  |  2/16/2016  | 
Cybersecurity is an issue business leaders fret a lot about in public, but they rarely treat the problem as a real and immediate threat.
Valentine's Day Inspires DDoS Attacks Against Online Florists
News  |  2/13/2016  | 
Security vendor Imperva says it has observed a sharp increase in automated bot traffic directed at florist sites.
Ukraine Railway, Mining Company Attacked With BlackEnergy
News  |  2/12/2016  | 
Weeks after the malware played a role in a massive power outage in the Ukraine, BlackEnergy and its cohort KillDisk were used in other attacks as well, Trend Micro says.
Perceptions Of IT Risk Changing In Business Ranks
News  |  2/12/2016  | 
Business leaders increasingly see IT risk as huge, but policy making and visibility still lag.
5 Reveals About Today's Attack M.O.s From Skype Spying Malware
News  |  2/11/2016  | 
T9000 backdoor is built with many of today's cybercriminal tricks up its sleeves.
The Phishie Awards: (Dis)Honoring The Best Of The Worst Phishing Attacks
Slideshows  |  2/10/2016  | 
From the costly to the clever to the just plain creepy, here are the recent phishing campaigns that have earned our reluctant recognition.
Simplifying Application Security: 4 Steps
Commentary  |  2/10/2016  | 
It's time to leave behind the misconceptions about the cost and effort required by effective application security. Here's how.
As Dyre Goes Quiet, Focus Turns On Other Banking Trojans
News  |  2/9/2016  | 
Dridex, Gozi, and Shifu are just three of the many malware tools that could replace Dyre, security researchers say.
New White House Cybersecurity Plan Creates Federal CISO
News  |  2/9/2016  | 
Cybersecurity National Action Plan aims to increase federal cybersecurity spending by 35 percent to modernize IT and address skills shortage, IoT.
Monday Morning Quarterbacking Super Bowl 50: Infosec Edition
Commentary  |  2/8/2016  | 
How to coach your team to victory in the battle to protect corporate data and intellectual property. After all, theres a lot riding on your game, too.
10 Shocking New Facts About Ransomware
Slideshows  |  2/8/2016  | 
Ransomware has taken over the cybercriminal world in the last few years and there's no end in sight.
Online 'Batman' Takes On Dridex Banking Trojan Operators
News  |  2/5/2016  | 
Several Dridex malware download sites have begun mysteriously serving up antivirus software instead.
Heres How To Protect Against A Ransomware Attack
News  |  2/4/2016  | 
Recovering data encrypted by a ransomware attack is next to impossible, so prevention offers the better approach.
Agriculture, Alternative Energy Could Be Chinese Hackers' Next Targets
News  |  2/3/2016  | 
Perhaps Anthem and Premera breaches were not just about stealing PII, but about researching the ins and outs of Western healthcare systems, CrowdStrike's annual global threat report says.
Zero Trust: Now A Critical Foundation For Securing Mobile
Commentary  |  2/3/2016  | 
No longer willing to rely on an OS that doesn't provide the security features they need, developers are taking steps to secure apps, defend data, and protect users.
As Good As They're Getting, Analytics Don't Inherently Protect Data
Commentary  |  2/2/2016  | 
It is only a matter of time before your system is breached, and when your data is lost, analytics won't help you.
Encryption Has Its Place But It Isnt Foolproof
Commentary  |  2/2/2016  | 
Most encrypted data is unencrypted at some point in its lifecycle -- and the bad guys are pretty good at finding the one window left open.
Macro Malware Resurgence Highlighted By Kasidet Outbreak
News  |  2/2/2016  | 
Also known as Neutrino, this piece of malware is another case of Office macro malaise.
First Hacker Arrested for CyberTerror Charges Arrives In American Court
Quick Hits  |  2/1/2016  | 
Kosovo citizen faces a maximum sentence of 35 years in prison for hacking and providing material support to ISIS.
IEEE Anti-Malware Support Service Goes Live
Commentary  |  2/1/2016  | 
Through the collaborative effort of major players in the computer security industry, organizations now have two new tools for better malware detection.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25288
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
CVE-2020-25781
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
CVE-2020-25830
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
CVE-2020-26159
PUBLISHED: 2020-09-30
In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .
CVE-2020-6654
PUBLISHED: 2020-09-30
A DLL Hijacking vulnerability in Eaton's 9000x Programming and Configuration Software v 2.0.38 and prior allows an attacker to execute arbitrary code by replacing the required DLLs with malicious DLLs when the software try to load vci11un6.DLL and cinpl.DLL.