informa
/

Vulnerabilities/Threats

Reports Point to Uptick in HTML Smuggling Attacks
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
July 30, 2021
Menlo Security and Microsoft report recent campaigns implementing the technique, which helps attackers stealthily delive...
by Kelly Sheridan, Senior Editor
July 30, 2021
5 min read
Article
What's Essential in an Incident Response Plan? Security Leaders Weigh In
A new report examines the must-have components of a security incident readiness and response playbook.
July 30, 2021
A new report examines the must-have components of a security incident readiness and response playbook.
by Dark Reading Staff, Dark Reading
July 30, 2021
1 min read
Article
Identity Breach Report Finds New COVID-19 Cyber Vulnerabilities
Report examines new trends in the deep and dark web, how threat actors are exploiting the global COVID-19 crisis, and ri...
July 30, 2021
Report examines new trends in the deep and dark web, how threat actors are exploiting the global COVID-19 crisis, and ri...
July 30, 2021
4 min read
Article
CISA Launches New Vulnerability Disclosure Policy Platform
The VDP platform provides a single website where agencies can intake, triage, and route the vulnerabilities that researc...
July 30, 2021
The VDP platform provides a single website where agencies can intake, triage, and route the vulnerabilities that researc...
by Dark Reading Staff, Dark Reading
July 30, 2021
2 min read
Article
Next for Bug Bounties: More Open Source Funding
Ten years after kicking off its Vulnerability Rewards Program, Google sees another decade of bounties with a focus on sh...
July 30, 2021
Ten years after kicking off its Vulnerability Rewards Program, Google sees another decade of bounties with a focus on sh...
by Robert Lemos, Contributing Writer
July 30, 2021
5 min read
Article
Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
July 30, 2021
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a ne...
by Kelly Jackson Higgins, Executive Editor
July 30, 2021
6 min read
Article
Chinese-Speaking Threat Actor Using Unknown Rootkit in Targeted Attacks
Security vendor says it first spotted 'GhostEmperor' when investigating attacks targeting Microsoft Exchange flaws.
July 29, 2021
Security vendor says it first spotted 'GhostEmperor' when investigating attacks targeting Microsoft Exchange flaws.
by Jai Vijayan, Contributing Writer
July 29, 2021
4 min read
Article
Babuk Coding Errors Make Data Recovery 'Impossible'
The ransomware group's decryption tool is poorly designed and coded, leading the group to focus more on data theft rathe...
July 29, 2021
The ransomware group's decryption tool is poorly designed and coded, leading the group to focus more on data theft rathe...
by Dark Reading Staff, Dark Reading
July 29, 2021
2 min read
Article
Lower-Level Employees Become Top Spear-Phishing Targets
Cybercriminals seek employees who will be a "weak link" in the organization when designing phishing attacks, a new repor...
July 29, 2021
Cybercriminals seek employees who will be a "weak link" in the organization when designing phishing attacks, a new repor...
by Dark Reading Staff, Dark Reading
July 29, 2021
2 min read
Article
Tenable Helps Organizations Disrupt Attacks with New Active Directory Security Readiness Checks
Tenable has developed 10 foundational configuration checks for its solutions, including Tenable.io, Tenable.sc and both ...
July 29, 2021
Tenable has developed 10 foundational configuration checks for its solutions, including Tenable.io, Tenable.sc and both ...
July 29, 2021
3 min read
Article
How Adversaries Still Target Microsoft Active Directory 20 Years Later
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
July 29, 2021
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
by Andy Robbins, Technical Architect, SpecterOps
July 29, 2021
6 min read
Article
Why Your People Are the Best Untapped Security Strategy
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among empl...
July 29, 2021
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among empl...
by Jason Lee, Chief Information Security Officer, Zoom
July 29, 2021
4 min read
Article
CISA, FBI Name the Most Exploited Vulnerabilities Over the Past Year
List shows many relatively new and perimeter-like devices targeted in 2020 and 2021, according to an analysis by CISA, t...
July 28, 2021
List shows many relatively new and perimeter-like devices targeted in 2020 and 2021, according to an analysis by CISA, t...
by Jai Vijayan, Contributing Writer
July 28, 2021
5 min read
Article
White House Issues Memo on US Critical Infrastructure Security
The memo describes critical infrastructure threats as one of the most significant issues confronting the nation.
July 28, 2021
The memo describes critical infrastructure threats as one of the most significant issues confronting the nation.
by Dark Reading Staff, Dark Reading
July 28, 2021
2 min read
Article
How We Can Start Winning the Cyber War
Government and industry must work hand-in-hand to execute a winning game plan against cyber terrorists.
July 28, 2021
Government and industry must work hand-in-hand to execute a winning game plan against cyber terrorists.
by Mark Carrigan, COO, PAS, Part of Hexagon
July 28, 2021
3 min read
Article