Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

News & Commentary
Virgin Media Could Pay 4.5B for Leak Affecting 900,000 Customers
Dark Reading Staff, Quick Hits
A misconfigured database holding personal data was left available online between April 2019 and February 2020.
By Dark Reading Staff , 3/27/2020
Comment2 comments  |  Read  |  Post a Comment
Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely
Robert Lemos, Contributing WriterNews
The attack takes control of poorly secured network devices, redirecting Web addresses to a COVID-themed landing page that attempts to fool victims into downloading malware.
By Robert Lemos Contributing Writer, 3/27/2020
Comment0 comments  |  Read  |  Post a Comment
Missing Patches, Misconfiguration Top Technical Breach Causes
Kelly Sheridan, Staff Editor, Dark ReadingNews
Less than half of businesses surveyed can patch critical vulnerabilities within 72 hours. Why does the process take so long?
By Kelly Sheridan Staff Editor, Dark Reading, 3/25/2020
Comment0 comments  |  Read  |  Post a Comment
FBI Shutters Russian-Based Hacker Platform, Makes Arrest
Dark Reading Staff, Quick Hits
The Deer.io platform let cybercriminals buy access to virtual storefronts where they could sell illicit products and services.
By Dark Reading Staff , 3/25/2020
Comment1 Comment  |  Read  |  Post a Comment
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers warn Microsoft 365 account holders to pay attention to unknown applications that request permissions.
By Kelly Sheridan Staff Editor, Dark Reading, 3/24/2020
Comment2 comments  |  Read  |  Post a Comment
Malware Found Hidden in Android Utility Apps, Children's Games
Dark Reading Staff, Quick Hits
The 'Tekya' malware, as researchers call it, is designed to imitate the user's actions to click advertisements.
By Dark Reading Staff , 3/24/2020
Comment0 comments  |  Read  |  Post a Comment
How to Secure Your Kubernetes Deployments
Gadi Naor, CTO and Co-Founder, AlcideCommentary
As more companies shift their software to a microservices-based architecture and orchestrate their containerized applications in Kubernetes, distributed security controls become a must.
By Gadi Naor CTO and Co-Founder, Alcide, 3/24/2020
Comment0 comments  |  Read  |  Post a Comment
Cybercriminals' Promises to Pause During Pandemic Amount to Little
Robert Lemos, Contributing WriterNews
As pandemic worsens, online profiteering -- from fraudsters to ransomware operators to cybercriminal hacking -- continues unabated, despite some promises from the underground.
By Robert Lemos Contributing Writer, 3/24/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Publishes Advisory for Windows Zero-Day
Kelly Sheridan, Staff Editor, Dark ReadingNews
There is no available patch for the vulnerabilities, which Microsoft says exist in all supported versions of Windows.
By Kelly Sheridan Staff Editor, Dark Reading, 3/23/2020
Comment0 comments  |  Read  |  Post a Comment
FBI Warns of Fake CDC Emails in COVID-19 Phishing Alert
Dark Reading Staff, Quick Hits
Fraudsters exploit concerns by claiming to offer virus-related information or promising stimulus checks.
By Dark Reading Staff , 3/23/2020
Comment0 comments  |  Read  |  Post a Comment
8 Infosec Page-Turners for Days Spent Indoors
Kelly Sheridan, Staff Editor, Dark Reading
Stuck inside and looking for a new read? Check out these titles written by security practitioners and reporters across the industry.
By Kelly Sheridan Staff Editor, Dark Reading, 3/23/2020
Comment2 comments  |  Read  |  Post a Comment
From Zero to Hero: CISO Edition
Mike Convertino, Chief Security Officer at Arceo.aiCommentary
It's time for organizations to realize that an empowered CISO can effectively manage enterprise risk and even grow the business along the way.
By Mike Convertino Chief Security Officer at Arceo.ai, 3/23/2020
Comment0 comments  |  Read  |  Post a Comment
200M Records of US Citizens Leaked in Unprotected Database
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.
By Kelly Sheridan Staff Editor, Dark Reading, 3/20/2020
Comment2 comments  |  Read  |  Post a Comment
Security Ratings Are a Dangerous Fantasy
Dr. Tim Junio, co-founder and CEO of ExpanseCommentary
They don't predict breaches, and they don't help people make valuable business decisions or make users any safer.
By Dr. Tim Junio co-founder and CEO of Expanse, 3/20/2020
Comment1 Comment  |  Read  |  Post a Comment
DDoS Attack Targets German Food Delivery Service
Dark Reading Staff, Quick Hits
Liefrando delivers food from more than 15,000 restaurants in Germany, where people under COVID-19 restrictions depend on the service.
By Dark Reading Staff , 3/19/2020
Comment2 comments  |  Read  |  Post a Comment
VPN Usage Surges as More Nations Shut Down Offices
Robert Lemos, Contributing WriterNews
As social distancing becomes the norm, interest in virtual private networks has rocketed, with some providers already seeing a doubling in users and traffic since the beginning of the year.
By Robert Lemos Contributing Writer, 3/19/2020
Comment2 comments  |  Read  |  Post a Comment
Achieving DevSecOps Requires Cutting Through the Jargon
Mario DiNatale, Head of Platform Security. ZeroNorthCommentary
Establishing a culture where security can work easily with developers starts with making sure they can at least speak the same language.
By Mario DiNatale Head of Platform Security. ZeroNorth, 3/19/2020
Comment2 comments  |  Read  |  Post a Comment
TrickBot Module Takes Aim at Remote Desktops
Robert Lemos, Contributing WriterNews
The module, still in development, focuses on compromising Windows systems by brute-forcing accounts via the Remote Desktop Protocol.
By Robert Lemos Contributing Writer, 3/18/2020
Comment0 comments  |  Read  |  Post a Comment
Process Injection Tops Attacker Techniques for 2019
Kelly Sheridan, Staff Editor, Dark ReadingNews
Attackers commonly use remote administration and network management tools for lateral movement, a new pool of threat data shows.
By Kelly Sheridan Staff Editor, Dark Reading, 3/18/2020
Comment0 comments  |  Read  |  Post a Comment
Trend Micro Patches Two Zero-Days Under Attack
Dark Reading Staff, Quick Hits
Businesses are urged to update the Apex One and OfficeScan XG enterprise security products as soon as possible.
By Dark Reading Staff , 3/18/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-6095
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
CVE-2020-10817
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
CVE-2020-10952
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.