informa

News

3 Ways Attackers Bypass Cloud Security
At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.
December 09, 2022
At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.
by Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
December 09, 2022
3 MIN READ
Article
Lack of Cybersecurity Expertise Poses Threat for Public-Safety Orgs
More than three-quarters of police and emergency responders worry about ransomware attacks and data leaks, while their organizations lag behind in technology adoption.
December 08, 2022
More than three-quarters of police and emergency responders worry about ransomware attacks and data leaks, while their organizations lag behind in technology adoption.
by Robert Lemos, Contributing Writer, Dark Reading
December 08, 2022
3 MIN READ
Article
Report: Air-Gapped Networks Vulnerable to DNS Attacks
Common mistakes in network configuration can jeopardize the security of highly protected assets and allow attackers to steal critical data from the enterprise.
December 08, 2022
Common mistakes in network configuration can jeopardize the security of highly protected assets and allow attackers to steal critical data from the enterprise.
by Elizabeth Montalbano, Contributor, Dark Reading
December 08, 2022
5 MIN READ
Article
Hacker Fails for the Win
Security researchers share their biggest initial screwups in some of their key vulnerability discoveries.
December 08, 2022
Security researchers share their biggest initial screwups in some of their key vulnerability discoveries.
by Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
December 08, 2022
3 MIN READ
Article
Rackspace Incident Highlights How Disruptive Attacks on Cloud Providers Can Be
A ransomware attack on the company's Hosted Exchange environment disrupted email for thousands of mostly small and midsize businesses.
December 07, 2022
A ransomware attack on the company's Hosted Exchange environment disrupted email for thousands of mostly small and midsize businesses.
by Jai Vijayan, Contributing Writer, Dark Reading
December 07, 2022
5 MIN READ
Article
Fraudsters Siphon $360M From Retailers Using 50M Fake Shoppers
Cyberattackers focused on ad fraud and clickjacking stole millions during Black Friday by hijacking shopper accounts and tying up transactions.
December 07, 2022
Cyberattackers focused on ad fraud and clickjacking stole millions during Black Friday by hijacking shopper accounts and tying up transactions.
by Robert Lemos, Contributing Writer, Dark Reading
December 07, 2022
4 MIN READ
Article
Zerobot Weaponizes Numerous Flaws in Slew of IoT Devices
The botnet exploits flaws in various routers, firewalls, network-attached storage, webcams, and other products and allows attackers to take over affected systems.
December 07, 2022
The botnet exploits flaws in various routers, firewalls, network-attached storage, webcams, and other products and allows attackers to take over affected systems.
by Elizabeth Montalbano, Contributor, Dark Reading
December 07, 2022
3 MIN READ
Article
For Cyberattackers, Popular EDR Tools Can Turn into Destructive Data Wipers
Microsoft, three others release patches to fix a vulnerability in their respective products that enables such manipulation. Other EDR products potentially are affected as well.
December 07, 2022
Microsoft, three others release patches to fix a vulnerability in their respective products that enables such manipulation. Other EDR products potentially are affected as well.
by Jai Vijayan, Contributing Writer, Dark Reading
December 07, 2022
4 MIN READ
Article
Shift to Memory-Safe Languages Gains Momentum
Software firms and the National Security Agency urge developers to move to memory-safe programming languages to eliminate a major source of high-severity flaws.
December 07, 2022
Software firms and the National Security Agency urge developers to move to memory-safe programming languages to eliminate a major source of high-severity flaws.
by Robert Lemos, Contributing Writer, Dark Reading
December 07, 2022
4 MIN READ
Article
Russian Actors Use Compromised Healthcare Networks Against Ukrainian Orgs
Victims include at least 15 healthcare organizations, one Fortune 500 company, and other organizations in multiple countries, security vendor says.
December 06, 2022
Victims include at least 15 healthcare organizations, one Fortune 500 company, and other organizations in multiple countries, security vendor says.
by Jai Vijayan, Contributing Writer, Dark Reading
December 06, 2022
4 MIN READ
Article
Machine Learning Models: A Dangerous New Attack Vector
Threat actors can weaponize code within AI technology to gain initial network access, move laterally, deploy malware, steal data, or even poison an organization's supply chain.
December 06, 2022
Threat actors can weaponize code within AI technology to gain initial network access, move laterally, deploy malware, steal data, or even poison an organization's supply chain.
by Elizabeth Montalbano, Contributor, Dark Reading
December 06, 2022
5 MIN READ
Article
Wiper, Disguised as Fake Ransomware, Targets Russian Orgs
The program, dubbed CryWiper, is aimed at Russian targets; it requests a ransom but has no way to decrypt any overwritten files.
December 05, 2022
The program, dubbed CryWiper, is aimed at Russian targets; it requests a ransom but has no way to decrypt any overwritten files.
by Robert Lemos, Contributing Writer, Dark Reading
December 05, 2022
4 MIN READ
Article
Infostealer Malware Market Booms, as MFA Fatigue Sets In
The successful combo of stolen credentials and social engineering to breach networks is increasing demand for infostealers on the Dark Web.
December 05, 2022
The successful combo of stolen credentials and social engineering to breach networks is increasing demand for infostealers on the Dark Web.
by Nathan Eddy, Contributing Writer, Dark Reading
December 05, 2022
5 MIN READ
Article
Ransomware Professionalization Grows as RaaS Takes Hold
As ransomware's prevalence has grown over the past decade, leading ransomware groups such as Conti have added services and features as part of a growing trend toward professionalization.
December 05, 2022
As ransomware's prevalence has grown over the past decade, leading ransomware groups such as Conti have added services and features as part of a growing trend toward professionalization.
by Nathan Eddy, Contributing Writer, Dark Reading
December 05, 2022
4 MIN READ
Article
Malware Authors Inadvertently Take Down Own Botnet
A single improperly formatted command has effectively killed KmsdBot botnet, security vendor says.
December 05, 2022
A single improperly formatted command has effectively killed KmsdBot botnet, security vendor says.
by Jai Vijayan, Contributing Writer, Dark Reading
December 05, 2022
3 MIN READ
Article