Threat Intelligence

News & Commentary
'Webstresser' DDoS Attack Site Shut Down in International Operation
Kelly Sheridan, Staff Editor, Dark ReadingNews
Investigators arrested the admins of Webstresser, the world's largest DDoS marketplace reportedly responsible for more than four million attacks.
By Kelly Sheridan Staff Editor, Dark Reading, 4/25/2018
Comment0 comments  |  Read  |  Post a Comment
Latest News from RSAC 2018
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive coverage of the news and security themes that dominated RSA Conference 2018 in San Francisco.
By Dark Reading Staff , 4/25/2018
Comment0 comments  |  Read  |  Post a Comment
Coviello: Modern Security Threats are 'Less About the Techniques'
Kelly Sheridan, Staff Editor, Dark ReadingNews
Today's attack surface is broader, more open, and demands a proactive approach to security, according to former RSA chairman Art Coviello.
By Kelly Sheridan Staff Editor, Dark Reading, 4/24/2018
Comment2 comments  |  Read  |  Post a Comment
MEDantex Healthcare Transcription Firm Accidentally Exposes Medical Records
Kelly Sheridan, Staff Editor, Dark ReadingQuick Hits
Exposed data likely the result of a flawed system rebuild after a recent ransomware attack on the company.
By Kelly Sheridan Staff Editor, Dark Reading, 4/24/2018
Comment1 Comment  |  Read  |  Post a Comment
Cybersecurity Buzz Phrase Bingo
Ericka Chickowski, Contributing Writer, Dark Reading
The RSA Conference expo was chock full of vendors showing off their wares with language as colorful as the blinky lights on a SOC dashboard.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
Threat Intel: Finding Balance in an Overcrowded Market
Kelly Sheridan, Staff Editor, Dark ReadingNews
Industry insiders discuss how threat intelligence has changed and what may happen as the market becomes increasingly saturated.
By Kelly Sheridan Staff Editor, Dark Reading, 4/23/2018
Comment2 comments  |  Read  |  Post a Comment
New Survey Shows Hybrid Cloud Confidence
Dark Reading Staff, Quick Hits
Executives are mostly confident in their hybrid cloud security, according to the results of a new survey.
By Dark Reading Staff , 4/23/2018
Comment0 comments  |  Read  |  Post a Comment
Cybercrime Economy Generates $1.5 Trillion a Year
Kelly Sheridan, Staff Editor, Dark ReadingNews
Threat actors generate, launder, spend, and reinvest more than $1.5 trillion in illicit funds, according to a new study on cybercrime's 'web of profit.'
By Kelly Sheridan Staff Editor, Dark Reading, 4/20/2018
Comment0 comments  |  Read  |  Post a Comment
SunTrust Ex-Employee May Have Stolen Data on 1.5 Million Bank Clients
Dark Reading Staff, Quick Hits
Names, addresses, phone numbers, account balances, may have been exposed.
By Dark Reading Staff , 4/20/2018
Comment4 comments  |  Read  |  Post a Comment
DNC Sues Guccifer 2.0, Russian Federation & Trump Campaign for Election Conspiracy
Dark Reading Staff, Quick Hits
DNC first hacked by Russians in 2015, according to the filing.
By Dark Reading Staff , 4/20/2018
Comment0 comments  |  Read  |  Post a Comment
At RSAC, SOC 'Sees' User Behaviors
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Instruments at the RSA Security Operations Center give analysts insight into attendee behavior on an open network.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/20/2018
Comment0 comments  |  Read  |  Post a Comment
Microsoft CISO Talks Threat Intel, 'Data Inclusion'
Kelly Sheridan, Staff Editor, Dark ReadingNews
Dark Reading caught up with Microsoft's Bret Arsenault to discuss intelligence, identity, and the need to leverage more diverse datasets.
By Kelly Sheridan Staff Editor, Dark Reading, 4/19/2018
Comment2 comments  |  Read  |  Post a Comment
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark ReadingNews
It's a critical time for social media platforms and the government agencies and private businesses and individuals using them.
By Kelly Sheridan Staff Editor, Dark Reading, 4/19/2018
Comment2 comments  |  Read  |  Post a Comment
The Role of KPIs in Incident Response
John Moran, Senior Product Manager, DFLabsCommentary
Using KPIs can have a positive impact on the tactical and strategic functions of a security operations program.
By John Moran Senior Product Manager, DFLabs, 4/18/2018
Comment1 Comment  |  Read  |  Post a Comment
Cyber War Game Shows How Federal Agencies Disagree on Incident Response
Sara Peters, Senior Editor at Dark ReadingNews
Former officials at DHS, DOJ, and DOD diverge on issues of attribution and defining what constitutes an act of cyber war.
By Sara Peters Senior Editor at Dark Reading, 4/18/2018
Comment0 comments  |  Read  |  Post a Comment
Data Visibility, Control Top Cloud Concerns at RSA
Kelly Sheridan, Staff Editor, Dark ReadingNews
As the traditional perimeter dissolves and sensitive data moves to the cloud, security experts at RSA talk about how they're going to protect it.
By Kelly Sheridan Staff Editor, Dark Reading, 4/18/2018
Comment0 comments  |  Read  |  Post a Comment
How to Leverage Artificial Intelligence for Cybersecurity
Joe Cosmano, Senior Vice President of Engineering Services, iboss
AI and predictive analytics should be used to augment a companys security team, not replace it. Here's why.
By Joe Cosmano Senior Vice President of Engineering Services, iboss, 4/18/2018
Comment0 comments  |  Read  |  Post a Comment
Microsoft to Roll Out Azure Sphere for IoT Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
Azure Sphere, now in preview, is a three-part program designed to secure the future of connected devices and powered by its own custom version of Linux.
By Kelly Sheridan Staff Editor, Dark Reading, 4/16/2018
Comment0 comments  |  Read  |  Post a Comment
INsecurity Conference Seeks Security Pros to Speak on Best Practices
Tim Wilson, Editor in Chief, Dark Reading, News
Dark Reading's second annual data defense conference will be held Oct. 23-25 in Chicago; call for speakers is issued.
By Tim Wilson, Editor in Chief, Dark Reading , 4/16/2018
Comment1 Comment  |  Read  |  Post a Comment
Symantec Now Offers Threat Detection Tools Used by its Researchers
Dark Reading Staff, Quick Hits
TAA now is part of Symantec's Integrated Cyber Defense Platform.
By Dark Reading Staff , 4/16/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Diversity: It's About Inclusion
Kelly Jackson Higgins, Executive Editor at Dark Reading,  4/25/2018
Coviello: Modern Security Threats are 'Less About the Techniques'
Kelly Sheridan, Staff Editor, Dark Reading,  4/24/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.