informa
/

Attacks/Breaches

New Raccoon Stealer Campaign Underscores an Evolving Threat
An information stealer disguised as pirated software targets cryptocurrencies and data while dropping malicious content ...
August 03, 2021
An information stealer disguised as pirated software targets cryptocurrencies and data while dropping malicious content ...
by Kelly Sheridan, Senior Editor
August 03, 2021
6 min read
Article
5 Questions Your Organization Must Ask to Prepare for a Ransomware Attack
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomwar...
August 03, 2021
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomwar...
by Yassir Abousselham, Chief Information Security Officer, Splunk
August 03, 2021
5 min read
Article
Think Having Avoided Kaseya Means You're Safe? Guess Again
The lesson: Don't assume that everything coming from an apparently benign source is safe.
August 03, 2021
The lesson: Don't assume that everything coming from an apparently benign source is safe.
by Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll
August 03, 2021
5 min read
Article
Average Cost to Buy Access to a Compromised Company: $1,000
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to special...
August 03, 2021
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to special...
by Robert Lemos, Contributing Writer
August 03, 2021
4 min read
Article
Defenders Face New Challenges As Attack Complexity Grows
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
August 02, 2021
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
by Dark Reading Staff, Dark Reading
August 02, 2021
1 min read
Article
Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new...
August 02, 2021
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new...
by Kelly Jackson Higgins, Executive Editor
August 02, 2021
6 min read
Article
Reports Point to Uptick in HTML Smuggling Attacks
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
July 30, 2021
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
by Kelly Sheridan, Senior Editor
July 30, 2021
5 min read
Article
What's Essential in an Incident Response Plan? Security Leaders Weigh In
A new report examines the must-have components of a security incident readiness and response playbook.
July 30, 2021
A new report examines the must-have components of a security incident readiness and response playbook.
by Dark Reading Staff, Dark Reading
July 30, 2021
1 min read
Article
Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
July 30, 2021
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
by Kelly Jackson Higgins, Executive Editor
July 30, 2021
6 min read
Article
Chinese-Speaking Threat Actor Using Unknown Rootkit in Targeted Attacks
Security vendor says it first spotted 'GhostEmperor' when investigating attacks targeting Microsoft Exchange flaws.
July 29, 2021
Security vendor says it first spotted 'GhostEmperor' when investigating attacks targeting Microsoft Exchange flaws.
by Jai Vijayan, Contributing Writer
July 29, 2021
4 min read
Article
Epiphany Systems Launches Offensive Context-Aware Platform
Epiphany's 'Exploitability Index' helps contextualize cyber-risk and drives better decisions.
July 29, 2021
Epiphany's 'Exploitability Index' helps contextualize cyber-risk and drives better decisions.
July 29, 2021
4 min read
Article
US Government Unlikely to Ban Ransomware Payments
The Department of Justice believes that banning ransom payments will cause greater havoc. However, the agency has called...
July 29, 2021
The Department of Justice believes that banning ransom payments will cause greater havoc. However, the agency has called...
by Robert Lemos, Contributing Writer
July 29, 2021
4 min read
Article
Lower-Level Employees Become Top Spear-Phishing Targets
Cybercriminals seek employees who will be a "weak link" in the organization when designing phishing attacks, a new repor...
July 29, 2021
Cybercriminals seek employees who will be a "weak link" in the organization when designing phishing attacks, a new repor...
by Dark Reading Staff, Dark Reading
July 29, 2021
2 min read
Article
CISA, FBI Name the Most Exploited Vulnerabilities Over the Past Year
List shows many relatively new and perimeter-like devices targeted in 2020 and 2021, according to an analysis by CISA, t...
July 28, 2021
List shows many relatively new and perimeter-like devices targeted in 2020 and 2021, according to an analysis by CISA, t...
by Jai Vijayan, Contributing Writer
July 28, 2021
5 min read
Article
Neustar Unveils UltraBot Protect
New bot manager features have been integrated into Neustar’s suite of application security products, combining DDoS, WAF...
July 28, 2021
New bot manager features have been integrated into Neustar’s suite of application security products, combining DDoS, WAF...
July 28, 2021
3 min read
Article