Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Jeffrey Burt

Latest Content
Page 1 / 2   >   >>
Vulnerability Puts Millions of Fortnite Players at Risk, Check Point Finds
Jeffrey Burt  |  1/18/2019  | 
Epic Games, the developer of Fortnite, fixed vulnerabilities in its web infrastructure that researchers said exposed the sensitive information of users of the wildly popular online game.
ServHelper & FlawedGrace Malware Highlight Shift in Cyber Attacks
Jeffrey Burt  |  1/11/2019  | 
The ServHelper and FlawedGrace malware developed by threat group TA505 exemplify the move away from smash-and-grab ransomware toward more stealthy, longer campaigns, according to a recent analysis by Proofpoint.
Spectre, Meltdown Vulnerabilities Will Haunt Industry for Years
Jeffrey Burt  |  1/8/2019  | 
Chip makers such as Intel have released patches and fixes to mitigate Spectre and Meltdown issues, but the problem won't be solved until they come out with new architectures, which is two to three years away.
Healthcare Industry Still in Ransomware Crosshairs
Jeffrey Burt  |  12/27/2018  | 
A report by Kaspersky researchers has found that healthcare organizations in the US and Canada are still at heightened risk of ransomware attacks.
Cloud Backup: How It Can Protect Against Ransomware
Jeffrey Burt  |  12/20/2018  | 
For enterprises anxious to avoid being extorted by attackers using ransomware, backing up data to the cloud is an option to consider, though it's not the answer for everyone.
Many Enterprises Still Blind to Security Risk, Study Finds
Jeffrey Burt  |  12/19/2018  | 
Even as organizations continue to get hit with cyber attacks, they're struggling to accurately measure the costs of such events to their operations, a report by Tenable and the Ponemon Institute found.
IoT Botnets Shifting to Exploit Vulnerabilities
Jeffrey Burt  |  12/13/2018  | 
A report from NetScout's ASERT Team finds that IoT devices are vulnerable to exploits for long periods of time and can be attacked within minutes after coming online.
M2M Protocols Expose IoT Data, Trend Micro Finds
Jeffrey Burt  |  12/11/2018  | 
The MQTT and CoAP protocols that are crucial to IoT and IIoT operations have significant vulnerabilities that puts devices at risk, according to analysis from Trend Micro.
APTs in 2018: A Mix of Old & New
Jeffrey Burt  |  12/10/2018  | 
Established threat groups and new players alike made for an active APTs scene this year, according to researchers with Kaspersky Lab.
Cybercriminal Underground Will Continue to Consolidate in 2019
Jeffrey Burt  |  12/3/2018  | 
There will be fewer malware-as-a-service families, but they will be bigger, stronger and more sophisticated, according to a report from McAfee.
Carbon Black: Cyber Attacks Could Jump 60% During Holidays
Jeffrey Burt  |  11/26/2018  | 
Spear-phishing campaigns are the most common form of attack as shoppers go to the stores and online and employees hit the road, according to a survey from Carbon Black.
IoT Security Problems Can Cost Enterprises Millions
Jeffrey Burt  |  11/20/2018  | 
A survey by DigiCert finds that the IoT is a priority for most companies, but many enterprises struggle when it comes to security and privacy. This can translate into firms losing millions.
Security Concerns Increasing as BYOD Programs Continue to Grow
Jeffrey Burt  |  11/19/2018  | 
Businesses are expanding their BYOD programs to include partners, customers and others, but most are behind in securing their mobile environments, according to a Bitglass survey.
On Eve of 2018 Midterm Elections, All Eyes Still on Cybersecurity
Jeffrey Burt  |  11/5/2018  | 
Netscout and McAfee executives talk about the myriad challenges facing state and county election officials as voting for the 2018 midterm elections is about to get underway.
Kaspersky: Most CISOs Say Cyber Attacks Are Inevitable
Jeffrey Burt  |  10/30/2018  | 
The Kaspersky Lab report says that while the relationship between executives and CISOs is improving, there continues to be a disconnect around such issues as budgets and the risk of threats.
iPhones Increasingly Vulnerable to Coinhive Cryptomining Malware
Jeffrey Burt  |  10/24/2018  | 
In their most recent Global Threat Index, Check Point researchers found a 400% increase in Coinhive attacks against iPhones by bad actors using the popular cryptomining malware.
McAfee: Seasalt Malware Raises Its Head Again
Jeffrey Burt  |  10/19/2018  | 
Code from the Seasalt malware that was last seen in 2010 has been found in new campaigns in North Korea and North America, according to McAfee.
Gallmaker Attackers Living Off the Land, Symantec Finds
Jeffrey Burt  |  10/15/2018  | 
Gallmaker, a new state-sponsored threat group, eschews custom malware for legitimate hacking tools and techniques to run under the radar while attacking government and military organizations in eastern Europe and the Middle East, according to recent research from Symantec.
DanaBot Banking Trojan Is Now Finding Its Way to the US
Jeffrey Burt  |  10/8/2018  | 
The DanaBot Trojan first targeting organizations in Australia earlier this year has expanded into Europe and now is aiming at US, according to Proofpoint.
USB Devices Still a Threat to Businesses, Kaspersky Finds
Jeffrey Burt  |  10/1/2018  | 
The use of removable storage media to deliver malware is declining, but threat actors are putting coin miners into USB devices and targeting emerging areas, a new study by Kaspersky finds.
Verizon Study Finds PCI DSS Compliance Falls Worldwide
Jeffrey Burt  |  9/27/2018  | 
Verizon's report says that fewer businesses are complying with the PCI DSS payment standard despite the rising threat of security breaches and consumer data theft.
Xbash Malware: Dangerous Mix of Threats
Jeffrey Burt  |  9/21/2018  | 
The Xbash malware includes ransomware and cryptomining functions as well as botnet and self-propagation capabilities and will delete Linux databases.
Ransomware Developers Embrace Politics, Targeting Obama, Trump & Merkel
Jeffrey Burt  |  9/20/2018  | 
Recent malware campaigns have used names such as Barak Obama, Angela Merkel and Donald Trump to entice unsuspecting users to download the ransomware, McAfee researchers have found.
PyLocky Ransomware Can Get Around Machine Learning Solutions
Jeffrey Burt  |  9/18/2018  | 
The PyLocky ransomware, detected by Trend Micro, puts a focus on the ongoing machine learning race between cybersecurity experts and bad actors.
Iran Targeting ISIS Supporters, Kurds With Spyware
Jeffrey Burt  |  9/14/2018  | 
Check Point researchers found that victims of Iran's campaign were enticed to download mobile apps that were packed with spyware.
Cobalt Group Returns With Downloader Malware
Jeffrey Burt  |  9/13/2018  | 
Proofpoint found new campaigns by the notorious cybercrime gang using its CobInt modular downloader.
Trend Micro: Cryptomining, Data Breaches Highlight Busy 1H 2018
Jeffrey Burt  |  9/7/2018  | 
The rise of design flaws in processors from Intel and other chip-makers and the slowing down of ransomware were key trends in cybersecurity in the first six months of the year.
Android Spyware BusyGasper: Small With Unusual Capabilities
Jeffrey Burt  |  9/5/2018  | 
Kaspersky researchers said the malware is not sophisticated, but it comes packed with a broad array of interesting features and capabilities.
Kaspersky: Lazarus Takes Aim at macOS in Cryptocurrency Campaign
Jeffrey Burt  |  8/28/2018  | 
Kaspersky researchers said users of Apple and Linux systems should see the AppleJesus campaign as a warning not to get lax in their cybersecurity efforts.
Vulnerable Web Apps Top Threat to Enterprises
Jeffrey Burt  |  8/22/2018  | 
A report by Kaspersky researchers found that 73% of successful network perimeter breaches in 2017 were committed via web apps, while inside threats continue to put companies at risk.
Congressional Campaign Websites Vulnerable to Attack, Say Researchers
Jeffrey Burt  |  8/17/2018  | 
Researchers presented a study at DEF CON that showed that a third of congressional candidates' websites are vulnerable to attack, adding to threats already seen by some politicians.
Check Point: Fax Machines, Networks Vulnerable to Attack
Jeffrey Burt  |  8/17/2018  | 
Researchers for the cybersecurity company found a way to exploit vulnerabilities in the fax system of an HP OfficeJet inkjet all-in-one printer to gain access to all systems on a network.
Researchers Show That Code Reuse Links Various North Korean Malware Groups
Jeffrey Burt  |  8/10/2018  | 
Analysts from McAfee and Intezer announced that by reviewing samples, they have found ties between campaigns and threat groups linked to North Korea.
Banking Trojans on the Rise in Q2, Kaspersky Report Finds
Jeffrey Burt  |  8/8/2018  | 
Kaspersky Labs saw a record number of new installation packages in the second quarter of this year, with modification to help the malware avoid security solutions.
Spam at 40: Still a Robust Security Threat in Middle Age
Jeffrey Burt  |  8/6/2018  | 
Four decades after the first such email was sent, attackers are still using spam to deliver their malware.
Kaspersky: Spear-Phishing Attacks Target 400 Industrial Companies
Jeffrey Burt  |  8/3/2018  | 
The emails in the spear-phishing campaign, which has been going on for months, are disguised as legitimate finance documents that include profiles of the organizations being attacked, according to Kaspersky Labs.
AZORult Downloader Adds Cryptomining, Ransomware Capabilities
Jeffrey Burt  |  8/1/2018  | 
Proofpoint researchers said the latest version of the AZORult information stealer and downloader makes it a larger threat and noted that the group behind it is now advertising its cryptomining and ransomware capabilities.
PowerGhost Cryptomining Malware Targets Corporate Networks
Jeffrey Burt  |  7/31/2018  | 
Kaspersky Lab researchers said the malware uses fileless techniques to make it harder to detect and the Eternal Blue exploit to spread to systems across the networks.
Kronos Returns as Banking Trojan Attacks Ramp Up
Jeffrey Burt  |  7/27/2018  | 
Proofpoint researchers have seen a new version of the four-year-old Kronos emerge in campaigns in Europe and Japan. The report also finds it may be rebranded as 'Osiris.'
Kaspersky: There's No Such Thing as a Free Gift Card Code
Jeffrey Burt  |  7/24/2018  | 
Kaspersky Labs is warning that bad actors are using a scheme offering free gift card codes from Amazon, Google, eBay and others to separate consumers from their personal data and money.
Attackers Increasingly Turning Attention to the Cloud
Jeffrey Burt  |  7/13/2018  | 
In the first half of 2018, Check Point researchers saw threat actors turning more of their attention to the cloud to steal data, as well as to grab compute power for cryptomining efforts.
IBM: Hidden Costs Drive Up Financial Hit of Mega Breaches to $350M
Jeffrey Burt  |  7/12/2018  | 
For companies that have 50 million records compromised, lost business and reputation, as well as the employee time spent in recovery work, can put the overall cost at $350 million.
Kaspersky: Asia the Focus of APT Operations in Q2
Jeffrey Burt  |  7/12/2018  | 
In their second quarter report, Kaspersky researchers also noted the return of various well-known bad actors and the threats facing networking hardware devices.
HNS IoT Botnet Evolves, Goes Cross-Platform
Jeffrey Burt  |  7/10/2018  | 
The Hide 'N Seek malware had previously targeted devices such as home routers and DVRs, but now the botnet is including Apache CouchDB and OrientDB in its expanding list of targets.
Cisco: GDPR Is About More Than Compliance
Jeffrey Burt  |  7/10/2018  | 
Cisco's top privacy official says that the EU's new privacy regulations – GDPR – gives forward-thinking companies an opportunity to excel by building new data management and privacy models.
How Quantum Physics Will Protect Against Quantum-Busting Encryption
Jeffrey Burt  |  7/5/2018  | 
The CEO of the startup Quantum Xchange envisions a nationwide dark fiber quantum network that protects encrypted data in transit with an on-demand Quantum Key Distribution service.
Mobile Malware Group Hits Google Play a Third Time
Jeffrey Burt  |  6/29/2018  | 
McAfee researchers found that AsiaHitGroup earlier this year again targeted Android device users in Asia with a bulked-up Sonvpay campaign complete with silent push notifications.
McAfee: Cybercriminals Improving Techniques as Cryptomining Explodes
Jeffrey Burt  |  6/28/2018  | 
Cybercrime campaigns during the quarter showed that bad actors are improving upon the threats from last year, according to McAfee. Meanwhile, cryptomining schemes continue to skyrocket.
IBM Spinout Senzing Fights Fraud, Insider Threats With AI
Jeffrey Burt  |  6/26/2018  | 
Senzing, a rare IBM spinout, enables organizations to quickly and easily run through thousands of corporate records to find bad actors that represent a threat to their businesses.
Olympic Destroyer Returns With Attacks in Europe
Jeffrey Burt  |  6/20/2018  | 
Kaspersky Labs researchers believe the hackers behind the Olympic Destroyer worm that wreaked havoc at the Winter Olympics are now focusing on organizations that research chemical and biological threats in Europe.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5604
PUBLISHED: 2020-07-09
Android App 'Mercari' (Japan version) prior to version 3.52.0 allows arbitrary method execution of a Java object by a remoto attacker via a Man-In-The-Middle attack by using Java Reflection API of JavaScript code on WebView.
CVE-2020-5974
PUBLISHED: 2020-07-08
NVIDIA JetPack SDK, version 4.2 and 4.3, contains a vulnerability in its installation scripts in which permissions are incorrectly set on certain directories, which can lead to escalation of privileges.
CVE-2020-15072
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An error-based SQL Injection vulnerability exists via the Import Administrators section.
CVE-2020-15073
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An XSS vulnerability occurs within the Import Administrators section via upload of an edited text document. This also affects the Subscriber Lists section.
CVE-2020-2034
PUBLISHED: 2020-07-08
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect...