Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in February 2016
So You Want to Be a Security Researcher?
News  |  2/26/2016  | 
Security researchers need a broad set of skills to investigate a constantly-changing threat landscape. But specializing in areas such as reverse engineering or network forensics will boost opportunities.
Phishing Attacks Increase Tech Sophistication, Focus On Financial Fraud
News  |  2/25/2016  | 
With a prevalence of free, feature-rich phishing kits and multi-million dollar profits from business email compromise attacks, no wonder phishing's so popular.
Breach Stats: Improving From Abysmal To Just Awful
News  |  2/25/2016  | 
Breach response times and volumes decreased significantly last year, but overall numbers still look ugly.
FBI Vs. Apple: Privacy Syllabus
Slideshows  |  2/24/2016  | 
Some of the very best articles, blogs, and other opinions on the issue of government meddling in encryption technology.
Operation Dust Storm Hackers Set Sights On Japan's Critical Infrastructure
News  |  2/23/2016  | 
Japanese energy, oil/gas, and transportation industries the target of stealthy, patient cyber-espionage group.
Leaky Apps Far Riskier Than Mobile Malware
News  |  2/23/2016  | 
Even top enterprise apps are rampant with data leakage and privacy-invasive behavior.
7 Ways Banking Botnets Are Keeping With The Times
News  |  2/22/2016  | 
Banking botnets have been plaguing online bankers and financial institutions for years now, and the attacks keep evolving.
Cybercrime And Hacking Atlas
Slideshows  |  2/20/2016  | 
A geographic guide with cybercrime threat and target trends in 10 notable countries.
New Trojan Xbot A Swiss-Army Knife Of Malicious Features
News  |  2/19/2016  | 
Malware can steal banking and card info, encrypt SD cards, intercept messages and more, say researchers at Palo Alto Networks
Web Gateways Need Backstops
News  |  2/19/2016  | 
New report emphasizes the importance of layered defense.
Adding Up The Total Costs of Ransomware
Commentary  |  2/19/2016  | 
Its a lot more than just the ransom. We did the math.
Here Comes Locky, A Brand New Ransomware Threat
News  |  2/18/2016  | 
Infected Word files being used to spread ransomware, security researchers say.
The Secret Life Of Stolen Credentials
News  |  2/18/2016  | 
Bitglass Threat Research Team's Project Cumulus demonstrates what happens when Google Drive credentials are 'stolen.'
Navigating Next-Gen Endpoint Security: A Buyers Journey
Commentary  |  2/18/2016  | 
Organizations will face a market in a state of transition as they evaluate information security solutions from both new and established vendors.
5 Exploit Trends Driving Attacks Today
News  |  2/17/2016  | 
HPE Cyber Risk Report 2016 picks apart infection stats from the past year.
Glibc Flaw Affects Thousands Of Linux Apps But How Dangerous Is It?
News  |  2/17/2016  | 
The difficulty involved in exploiting flaw could mitigate some of the risk, say some security researchers.
Today's New Payment Card Security In A Nutshell
Commentary  |  2/17/2016  | 
Businesses taking their time rolling out EMV card-compatible terminals are putting their data security and financial well-being at risk.
A Not-So-Secret Secret About Cybercrime
Commentary  |  2/16/2016  | 
Cybersecurity is an issue business leaders fret a lot about in public, but they rarely treat the problem as a real and immediate threat.
Valentine's Day Inspires DDoS Attacks Against Online Florists
News  |  2/13/2016  | 
Security vendor Imperva says it has observed a sharp increase in automated bot traffic directed at florist sites.
Ukraine Railway, Mining Company Attacked With BlackEnergy
News  |  2/12/2016  | 
Weeks after the malware played a role in a massive power outage in the Ukraine, BlackEnergy and its cohort KillDisk were used in other attacks as well, Trend Micro says.
Perceptions Of IT Risk Changing In Business Ranks
News  |  2/12/2016  | 
Business leaders increasingly see IT risk as huge, but policy making and visibility still lag.
5 Reveals About Today's Attack M.O.s From Skype Spying Malware
News  |  2/11/2016  | 
T9000 backdoor is built with many of today's cybercriminal tricks up its sleeves.
The Phishie Awards: (Dis)Honoring The Best Of The Worst Phishing Attacks
Slideshows  |  2/10/2016  | 
From the costly to the clever to the just plain creepy, here are the recent phishing campaigns that have earned our reluctant recognition.
Simplifying Application Security: 4 Steps
Commentary  |  2/10/2016  | 
Its time to leave behind the misconceptions about the cost and effort required by effective application security. Heres how.
As Dyre Goes Quiet, Focus Turns On Other Banking Trojans
News  |  2/9/2016  | 
Dridex, Gozi, and Shifu are just three of the many malware tools that could replace Dyre, security researchers say.
New White House Cybersecurity Plan Creates Federal CISO
News  |  2/9/2016  | 
Cybersecurity National Action Plan aims to increase federal cybersecurity spending by 35 percent to modernize IT and address skills shortage, IoT.
Monday Morning Quarterbacking Super Bowl 50: Infosec Edition
Commentary  |  2/8/2016  | 
How to coach your team to victory in the battle to protect corporate data and intellectual property. After all, theres a lot riding on your game, too.
10 Shocking New Facts About Ransomware
Slideshows  |  2/8/2016  | 
Ransomware has taken over the cybercriminal world in the last few years and there's no end in sight.
Online 'Batman' Takes On Dridex Banking Trojan Operators
News  |  2/5/2016  | 
Several Dridex malware download sites have begun mysteriously serving up antivirus software instead.
Heres How To Protect Against A Ransomware Attack
News  |  2/4/2016  | 
Recovering data encrypted by a ransomware attack is next to impossible, so prevention offers the better approach.
Agriculture, Alternative Energy Could Be Chinese Hackers' Next Targets
News  |  2/3/2016  | 
Perhaps Anthem and Premera breaches were not just about stealing PII, but about researching the ins and outs of Western healthcare systems, CrowdStrike's annual global threat report says.
Zero Trust: Now A Critical Foundation For Securing Mobile
Commentary  |  2/3/2016  | 
No longer willing to rely on an OS that doesn't provide the security features they need, developers are taking steps to secure apps, defend data, and protect users.
As Good As They're Getting, Analytics Don't Inherently Protect Data
Commentary  |  2/2/2016  | 
It is only a matter of time before your system is breached, and when your data is lost, analytics won't help you.
Encryption Has Its Place But It Isnt Foolproof
Commentary  |  2/2/2016  | 
Most encrypted data is unencrypted at some point in its lifecycle -- and the bad guys are pretty good at finding the one window left open.
Macro Malware Resurgence Highlighted By Kasidet Outbreak
News  |  2/2/2016  | 
Also known as Neutrino, this piece of malware is another case of Office macro malaise.
First Hacker Arrested for CyberTerror Charges Arrives In American Court
Quick Hits  |  2/1/2016  | 
Kosovo citizen faces a maximum sentence of 35 years in prison for hacking and providing material support to ISIS.
IEEE Anti-Malware Support Service Goes Live
Commentary  |  2/1/2016  | 
Through the collaborative effort of major players in the computer security industry, organizations now have two new tools for better malware detection.


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19071
PUBLISHED: 2019-11-18
A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
CVE-2019-19072
PUBLISHED: 2019-11-18
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
CVE-2019-19073
PUBLISHED: 2019-11-18
Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, ...
CVE-2019-19074
PUBLISHED: 2019-11-18
A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
CVE-2019-19075
PUBLISHED: 2019-11-18
A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.