informa
/

Attacks/Breaches

HTTP/2 Implementation Errors Exposing Websites to Serious Risks
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites an...
August 06, 2021
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites an...
by Jai Vijayan, Contributing Writer
August 06, 2021
4 min read
Article
CISA Launches JCDC, the Joint Cyber Defense Collaborative
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
August 05, 2021
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
by Kelly Jackson Higgins, Executive Editor
August 05, 2021
5 min read
Article
Incident Responders Explore Microsoft 365 Attacks in the Wild
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent acces...
August 05, 2021
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent acces...
by Kelly Sheridan, Senior Editor
August 05, 2021
5 min read
Article
Prophet Spider Exploits WebLogic CVEs to Enable Ransomware Attacks
The group target unpatched Oracle WebLogic servers to gain access that they later hand off to third parties who deploy r...
August 05, 2021
The group target unpatched Oracle WebLogic servers to gain access that they later hand off to third parties who deploy r...
by Dark Reading Staff, Dark Reading
August 05, 2021
2 min read
Article
Top 5 Techniques Attackers Use to Bypass MFA
Like other protective measures, multifactor authentication isn't failsafe or foolproof.
August 05, 2021
Like other protective measures, multifactor authentication isn't failsafe or foolproof.
by Hitesh Sheth, CEO, Vectra
August 05, 2021
4 min read
Article
VC Firm Advanced Technology Ventures Hit with Ransomware
The venture capital firm believes the attack affected personal data belonging to individual investors in ATV funds.
August 05, 2021
The venture capital firm believes the attack affected personal data belonging to individual investors in ATV funds.
by Dark Reading Staff, Dark Reading
August 05, 2021
2 min read
Article
Why Supply Chain Attacks Are Destined to Escalate
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for softwa...
August 05, 2021
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for softwa...
by Kelly Jackson Higgins, Executive Editor
August 05, 2021
4 min read
Article
REvil Most Popular Ransomware Variant in 2021 (So Far)
An increase in global cyberattacks was driven by Web shell activity, targeted ransomware and extortion operations, and s...
August 04, 2021
An increase in global cyberattacks was driven by Web shell activity, targeted ransomware and extortion operations, and s...
by Dark Reading Staff, Dark Reading
August 04, 2021
2 min read
Article
Think Having Avoided Kaseya Means You're Safe? Guess Again
The lesson: Don't assume that everything coming from an apparently benign source is safe.
August 04, 2021
The lesson: Don't assume that everything coming from an apparently benign source is safe.
by Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll
August 04, 2021
5 min read
Article
5 Key Lessons From ICS Attacks Through the Ages
Industrial control systems attacks are happening with more frequency, but they are hardly new.
August 04, 2021
Industrial control systems attacks are happening with more frequency, but they are hardly new.
by Corey Nachreiner, Chief Security Officer, WatchGuard Technologies
August 04, 2021
5 min read
Article
New Raccoon Stealer Campaign Underscores an Evolving Threat
An information stealer disguised as pirated software targets cryptocurrencies and data while dropping malicious content ...
August 03, 2021
An information stealer disguised as pirated software targets cryptocurrencies and data while dropping malicious content ...
by Kelly Sheridan, Senior Editor
August 03, 2021
6 min read
Article
5 Questions Your Organization Must Ask to Prepare for a Ransomware Attack
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomwar...
August 03, 2021
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomwar...
by Yassir Abousselham, Chief Information Security Officer, Splunk
August 03, 2021
5 min read
Article
Average Cost to Buy Access to a Compromised Company: $1,000
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to special...
August 03, 2021
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to special...
by Robert Lemos, Contributing Writer
August 03, 2021
4 min read
Article
Defenders Face New Challenges As Attack Complexity Grows
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
August 02, 2021
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
by Dark Reading Staff, Dark Reading
August 02, 2021
1 min read
Article
Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new...
August 02, 2021
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new...
by Kelly Jackson Higgins, Executive Editor
August 02, 2021
6 min read
Article