Attacks/Breaches

News & Commentary
IOTroop Botnet Hits Over a Million Organizations in Under 30 Days
Dawn Kawamoto, Associate Editor, Dark ReadingQuick Hits
The IoT botnet is expected to spread faster than Mirai.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/20/2017
Comment0 comments  |  Read  |  Post a Comment
The Week in Crypto: Bad News for SSH, WPA2, RSA & Privacy
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Between KRACK, ROCA, new threats to SSH keys, and the European Commission's loosey-goosey stance on encryption backdoors, it's been a difficult time for cryptography.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/20/2017
Comment0 comments  |  Read  |  Post a Comment
How to Talk to the C-Suite about Malware Trends
Raj Rajamani, VP, Product Management, SentinelOneCommentary
There is no simple answer to the question 'Are we protected against the latest brand-name malware attack?' But there is a smart one.
By Raj Rajamani VP, Product Management, SentinelOne, 10/20/2017
Comment0 comments  |  Read  |  Post a Comment
Overlay Technique from Brazilian Banking Trojans Making Resurgence
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New analysis says heavy reliance on overlays and manual remote execution of transactions being combined with more advanced features of traditional banking Trojans
By Ericka Chickowski Contributing Writer, Dark Reading, 10/20/2017
Comment0 comments  |  Read  |  Post a Comment
'BoundHook' Technique Enables Attacker Persistence on Windows Systems
Jai Vijayan, Freelance writerNews
CyberArk shows how attackers can leverage Intel's MPX technology to burrow deeper into a compromised Windows system.
By Jai Vijayan Freelance writer, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
10 Social Engineering Attacks Your End Users Need to Know About
Steve Zurier, Freelance Writer
It's Cybersecurity Awareness Month. Make sure your users are briefed on these 10 attacker techniques that are often overlooked.
By Steve Zurier Freelance Writer, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
IoT Deployment Security Top Concern for Enterprises
Dark Reading Staff, Quick Hits
A new survey shows that 63% of respondents are worried about the impact of the Internet of Things on corporate security technologies and processes.
By Dark Reading Staff , 10/19/2017
Comment1 Comment  |  Read  |  Post a Comment
What's Next after the SEC 'Insider Trading' Breach?
David L. Axelrod and Terence M. Grugan, Partner, Ballard SpahrCommentary
Last month's hack of the Securities and Exchange Commission may prove to be the most high-profile corporate gatekeeper attack to date. But it definitely won't be the last.
By David L. Axelrod and Terence M. Grugan Partner, Ballard Spahr, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
New Locky Ransomware Strain Emerges
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Latest version goes by the .asasin extension and is collecting information on users' computer operating system and IP address.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
Game Change: Meet the Mach37 Fall Startups
Ericka Chickowski, Contributing Writer, Dark Reading
CEOs describe how they think their fledgling ventures will revolutionize user training, privacy, identity management and embedded system security.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/18/2017
Comment2 comments  |  Read  |  Post a Comment
The Future of Democratic Threats is Digital
Kelly Sheridan, Associate Editor, Dark ReadingNews
Public policy and technological challenges take center stage as security leaders discuss digital threats to democracy.
By Kelly Sheridan Associate Editor, Dark Reading, 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
'Hacker Door' Backdoor Resurfaces as RAT a Decade Later
Dark Reading Staff, Quick Hits
Sophisticated backdoor re-emerges as a RAT more than a decade after its 2004 public release, with updated advanced malicious functionality.
By Dark Reading Staff , 10/18/2017
Comment2 comments  |  Read  |  Post a Comment
Reuters: Microsoft's 2013 Breach Hit Bug Repository, Insiders Say
Dark Reading Staff, Quick Hits
Five anonymous former Microsoft employees tell Reuters that Microsoft's database of internally discovered vulnerabilities was compromised in 2013, but Microsoft will not confirm it occurred.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
ATM Machine Malware Sold on Dark Web
Dark Reading Staff, Quick Hits
Cybercriminals are advertising ATM malware that's designed to exploit hardware and software vulnerabilities on the cash-dispensing machines.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Factorization Bug Exposes Millions Of Crypto Keys To 'ROCA' Exploit
Jai Vijayan, Freelance writerNews
Products from Lenovo, HPE, Google, Microsoft, and others impacted by flaw in Infineon chipset.
By Jai Vijayan Freelance writer, 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
InfoSec Pros Among Worst Offenders of Employer Snooping
Dawn Kawamoto, Associate Editor, Dark ReadingNews
A majority of IT security professionals admit to trolling through company information unrelated to their work -- even sensitive material.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/17/2017
Comment1 Comment  |  Read  |  Post a Comment
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLinkCommentary
The left side of the brain is logical and linear; the right side, creative. You have to use both sides of the brain to connect to your audience in your business.
By Bill Bradley SVP, Cyber Engineering and Technical Services, CenturyLink, 10/17/2017
Comment2 comments  |  Read  |  Post a Comment
Secure Wifi Hijacked by KRACK Vulns in WPA2
Jai Vijayan, Freelance writerNews
All modern WiFi access points and devices that have implemented the protocol vulnerable to attacks that allow decryption, traffic hijacking other attacks. Second, unrelated crypto vulnerability also found in RSA code library in TPM chips.
By Jai Vijayan Freelance writer, 10/16/2017
Comment1 Comment  |  Read  |  Post a Comment
DHS to Require All Fed Agencies to Use DMARC, HTTPS, and STARTTLS
Dawn Kawamoto, Associate Editor, Dark ReadingNews
The move follows a DHS review of federal government agencies' steps to secure email and deploy authentication technologies.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
New Cybercrime Campaign a 'Clear and Imminent' Threat to Banks Worldwide
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Hundreds of millions of dollars stolen from banks via an sophisticated attack that blended cyber and physical elements.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by LacyLoving
Current Conversations nice
In reply to: nice
Post Your Own Reply
More Conversations
PR Newswire
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.