informa

Vulnerabilities/Threats

Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit
The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.
January 26, 2022
The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.
by Robert Lemos, Contributing Writer
January 26, 2022
4 min read
Article
Cybersecurity Is Broken: How We Got Here & How to Start Fixing It
It's not just your imagination — malicious threats have exponentially increased organizational risk.
January 26, 2022
It's not just your imagination — malicious threats have exponentially increased organizational risk.
by David Ratner, CEO, Hyas
January 26, 2022
5 min read
Article
VPNLab.net Shuttered in Latest Spate of Global Takedowns
Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups.
January 26, 2022
Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups.
by Robert Lemos, Contributing Writer
January 26, 2022
4 min read
Article
Why It's Time to Rethink Incident Response
The incident response landscape has changed drastically, largely from shifting attitudes among insurance companies and, to some extent, business customers feeling the pain of security incidents.
January 26, 2022
The incident response landscape has changed drastically, largely from shifting attitudes among insurance companies and, to some extent, business customers feeling the pain of security incidents.
by J.R. Cunningham, Chief Security Officer, Nuspire
January 26, 2022
5 min read
Article
Threat Actors Use Microsoft OneDrive for Command-and-Control in Attack Campaign
Signs hint at Russia's APT28, aka Fancy Bear, being behind the attacks, according to new research.
January 25, 2022
Signs hint at Russia's APT28, aka Fancy Bear, being behind the attacks, according to new research.
by Jai Vijayan, Contributing Writer
January 25, 2022
4 min read
Article
Link11 Sets New Standards in DDoS Protection as Test Winner
In a recent performance test, cybersecurity provider Link11 was benchmarked against leading international security vendors and emerged as the winner. The study by Frost & Sullivan emphasized the importance of precise detection and speed in mitigating DDoS (Distributed Denial of Service) attacks.
January 25, 2022
In a recent performance test, cybersecurity provider Link11 was benchmarked against leading international security vendors and emerged as the winner. The study by Frost & Sullivan emphasized the importance of precise detection and speed in mitigating DDoS (Distributed Denial of Service) attacks.
January 25, 2022
4 min read
Article
8 Security Startups to Watch in 2022
Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.
January 25, 2022
Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.
by Kelly Sheridan, Senior Editor
January 25, 2022
1 min read
Article
Striking a Balance Between Cybersecurity Awareness and Anxiety
Employees don't have to be paralyzed by fear to keep the company safe. They just have to understand what threats look like and how to stop them.
January 25, 2022
Employees don't have to be paralyzed by fear to keep the company safe. They just have to understand what threats look like and how to stop them.
by Zack Schuler, Founder and CEO, NINJIO
January 25, 2022
5 min read
Article
As IoT Attacks Increase, Experts Fear More Serious Threats
Variants of the Mirai codebase are still a popular way to compromise and subvert Internet of Things devices, but experts fear more serious threats may be ahead.
January 25, 2022
Variants of the Mirai codebase are still a popular way to compromise and subvert Internet of Things devices, but experts fear more serious threats may be ahead.
by Robert Lemos, Contributing Writer
January 25, 2022
4 min read
Article
Trickbot Injections Get Harder to Detect & Analyze
The authors of the infamous malware family have added measures for better protecting malicious code injections against inspection and research.
January 24, 2022
The authors of the infamous malware family have added measures for better protecting malicious code injections against inspection and research.
by Jai Vijayan, Contributing Writer
January 24, 2022
5 min read
Article
Are You Prepared to Defend Against a USB Attack?
Recent "BadUSB" attacks serve as a reminder of the big damage that small devices can cause.
January 24, 2022
Recent "BadUSB" attacks serve as a reminder of the big damage that small devices can cause.
by Benny Czarny, Founder & CEO, OPSWAT
January 24, 2022
4 min read
Article
A Level-Set on Russia-Borne Cyber Threats
As hostilities mount between Russia and Ukraine, new and more dangerous cyberattacks are likely to develop. Pinpointing sources and motives will remain elusive, but enterprises should prepare for an escalation in cyberspace.
January 24, 2022
As hostilities mount between Russia and Ukraine, new and more dangerous cyberattacks are likely to develop. Pinpointing sources and motives will remain elusive, but enterprises should prepare for an escalation in cyberspace.
by Tanner Johnson, Principal Analyst, Data Security, OMDIA
January 24, 2022
6 min read
Article
REvil Ransomware Gang Arrests Trigger Uncertainty, Concern in Cybercrime Forums
Threat actors from Eastern Europe seen expressing some concern about Russia being a safe place for them to continue operating, researchers say.
January 21, 2022
Threat actors from Eastern Europe seen expressing some concern about Russia being a safe place for them to continue operating, researchers say.
by Jai Vijayan, Contributing Writer
January 21, 2022
4 min read
Article
Looking Beyond Biden's Binding Security Directive
Implementing these and other security procedures will greatly improve the security posture of the United States and its private partners.
January 21, 2022
Implementing these and other security procedures will greatly improve the security posture of the United States and its private partners.
by Mariano Nunez, CEO & Co-Founder, Onapsis
January 21, 2022
5 min read
Article
Biden Broadens NSA Oversight of National Security Systems
New Cybersecurity National Security Memorandum will let the spy agency "identify vulnerabilities, detect malicious threat activity and drive mitigations," agency cybersecurity director says.
January 20, 2022
New Cybersecurity National Security Memorandum will let the spy agency "identify vulnerabilities, detect malicious threat activity and drive mitigations," agency cybersecurity director says.
by Dark Reading Staff, Dark Reading
January 20, 2022
2 min read
Article