Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Attacks/Breaches
Page 1 / 2   >   >>
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
News  |  5/11/2021  | 
Trinity Cyber takes a new spin on some traditional network-security techniques, but can its approach catch on widely?
Adobe Issues Patch for Acrobat Zero-Day
Quick Hits  |  5/11/2021  | 
The vulnerability is being exploited in limited attacks against Adobe Reader users on Windows.
Application Attacks Spike as Criminals Target Remote Workers
Quick Hits  |  5/11/2021  | 
Application-specific and Web application attacks made up 67% of all attacks in 2020 as criminal strategies shifted in the pandemic.
Critical Infrastructure Under Attack
Commentary  |  5/11/2021  | 
Several recent cyber incidents targeting critical infrastructure prove that no open society is immune to attacks by cybercriminals. The recent shutdown of key US energy pipeline marks just the tip of the iceberg.
Colonial Pipeline Cyberattack: What Security Pros Need to Know
News  |  5/10/2021  | 
As the massive US pipeline operator works to restore operations after a DarkSide ransomware attack late last week, experts say it's a cautionary tale for critical infrastructure providers.
Tulsa Deals With Aftermath of Ransomware Attack
Quick Hits  |  5/10/2021  | 
Weekend attack shuts down several city sites and service.
Four Plead Guilty to RICO Conspiracy Involving Hosting Services for Cybercrime
Quick Hits  |  5/10/2021  | 
The "bulletproof hosting" organization hosted malware including Zeus, SpyEye, Citadel, and the Blackhole Exploit Kit.
Exchange Exploitation: Not Dead Yet
Commentary  |  5/10/2021  | 
The mass exploitation of Exchange Servers has been a wake-up call, and it will take all parties playing in concert for the industry to react, respond, and recover.
How North Korean APT Kimsuky Is Evolving Its Tactics
News  |  5/7/2021  | 
Researchers find differences in Kimsuky's operations that lead them to divide the APT into two groups: CloudDragon and KimDragon.
FBI, NSA, CISA & NCSC Issue Joint Advisory on Russian SVR Activity
Quick Hits  |  5/7/2021  | 
The report provides additional details on tactics of Russia's Foreign Intelligence Service following public attribution of the group to last year's SolarWinds attack.
Defending Against Web Scraping Attacks
Commentary  |  5/7/2021  | 
Web scraping attacks, like Facebook's recent data leak, can easily lead to more significant breaches.
Google Plans to Automatically Enable Two-Factor Authentication
Quick Hits  |  5/6/2021  | 
The company plans to automatically enroll users in two-step verification if their accounts are properly configured.
CISA Publishes Analysis on New 'FiveHands' Ransomware
Quick Hits  |  5/6/2021  | 
Attackers used publicly available tools, FiveHands ransomware, and SombRAT to successfully target an organization, officials report.
Securing the Internet of Things in the Age of Quantum Computing
Commentary  |  5/6/2021  | 
Internet security, privacy, and authentication aren't new issues, but IoT presents unique security challenges.
Cloud-Native Businesses Struggle With Security
News  |  5/6/2021  | 
More companies moved to cloud-native infrastructure in the past year, and security incidents and malware moved right along with them.
Wanted: The (Elusive) Cybersecurity 'All-Star'
News  |  5/5/2021  | 
Separate workforce studies by (ISC) and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the field.
Will 2021 Mark the End of World Password Day?
Commentary  |  5/5/2021  | 
We might be leaving the world of mandatory asterisks and interrobangs behind for good.
Newer Generic Top-Level Domains a Security 'Nuisance'
News  |  5/4/2021  | 
Ten years of passive DNS data shows classic TLDs such as .com and .net dominate newer TLDs in popularity and use.
Scripps Health Responds to Cyberattack
Quick Hits  |  5/4/2021  | 
The health care system says it has suspended access to patient portals and other applications related to operations at Scripps facilities.
Researchers Explore Active Directory Attack Vectors
News  |  5/3/2021  | 
Incident responders who investigate attacks targeting Active Directory discuss methods used to gain entry, elevate privileges, and control target systems.
Buer Malware Variant Rewritten in Rust Programming Language
Quick Hits  |  5/3/2021  | 
Researchers suggest a few reasons why operators rewrote Buer in an entirely new language
Dark Reading Celebrates 15th Anniversary
Commentary  |  5/3/2021  | 
Cybersecurity news site begins 16th year with plans to improve site, deliver more content on cyber threats and best practices.
Stopping the Next SolarWinds Requires Doing Something Different
Commentary  |  5/3/2021  | 
Will the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale?
Ransomware Task Force Publishes Framework to Fight Global Threat
News  |  4/30/2021  | 
An 81-page report details how ransomware has evolved, along with recommendations on how to deter attacks and disrupt its business model.
New Threat Group Carrying Out Aggressive Ransomware Campaign
News  |  4/30/2021  | 
UNC2447 observed targeting now-patched vulnerability in SonicWall VPN.
MITRE Adds MacOS, More Data Types to ATT&CK Framework
News  |  4/30/2021  | 
Version 9 of the popular threat matrix will improve support for a variety of platforms, including cloud infrastructure.
Survey Finds Broad Concern Over Third-Party App Providers Post-SolarWinds
Quick Hits  |  4/30/2021  | 
Most IT and cybersecurity professionals think security is important enough to delay deployment of applications, survey data shows.
7 Modern-Day Cybersecurity Realities
Slideshows  |  4/30/2021  | 
Security pros may be working with a false sense of security. We explore seven places where old methods and techniques have to change to keep their organizations safe.
API Hole on Experian Partner Site Exposes Credit Scores
Quick Hits  |  4/29/2021  | 
Student researcher is concerned security gap may exist on many other sites.
FluBot Malware's Rapid Spread May Soon Hit US Phones
News  |  4/28/2021  | 
The FluBot Android malware has spread throughout several European countries through an SMS package delivery scam.
74% of Financial Institutions See Spike in COVID-Related Threats
Quick Hits  |  4/28/2021  | 
Financial losses have also increased among organizations in the last year, with the average cost reaching $720,000.
FBI Works With 'Have I Been Pwned' to Notify Emotet Victims
Quick Hits  |  4/28/2021  | 
Officials shared 4.3 million email addresses with the HIBP website to help inform companies and individuals if Emotet compromised their accounts.
Is Your Cloud Raining Sensitive Data?
Commentary  |  4/28/2021  | 
Learn common Kubernetes vulnerabilities and ways to avoid them.
Do Cyberattacks Affect Stock Prices? It Depends on the Breach
News  |  4/27/2021  | 
A security researcher explores how data breaches, ransomware attacks, and other types of cybercrime influence stock prices.
Emotet Malware Uninstalled From Infected Devices
Quick Hits  |  4/27/2021  | 
A law enforcement update deployed to compromised machines in January has been pushed, effectively removing the malware.
Ransomware Recovery Costs Near $2M
Quick Hits  |  4/27/2021  | 
The cost of recovering from a ransomware attack has more than doubled in one year, Sophos researchers report.
4 Ways CISOs Can Strengthen Their Security Resilience
Commentary  |  4/27/2021  | 
Security pros must remember bad actors will target their infrastructure, using counter-incident response technology in the process.
US Urges Organizations to Implement MFA, Other Controls to Defend Against Russian Attacks
News  |  4/26/2021  | 
Actors working for Moscow's Foreign Intelligence Service are actively targeting organizations in government and other sectors, FBI and DHS say.
In Appreciation: Dan Kaminsky
News  |  4/26/2021  | 
Beloved security industry leader and researcher passes away unexpectedly at the age of 42.
Password Manager Suffers 'Supply Chain' Attack
Quick Hits  |  4/23/2021  | 
A software update to Click Studios' Passwordstate password manager contained malware.
Insider Data Leaks: A Growing Enterprise Threat
Quick Hits  |  4/23/2021  | 
Report finds 85% of employees are more likely to leak sensitive files now than before the COVID-19 pandemic.
Supernova Malware Actors Masqueraded as Remote Workers to Access Breached Network
News  |  4/22/2021  | 
China-based Spiral group is believed to be behind year-long attack, which exploited a flaw in SolarWinds Orion technology to drop a Web shell.
Prometei Botnet Adds New Twist to Exchange Server Attacks
Quick Hits  |  4/22/2021  | 
Attackers are using the well-known Microsoft Exchange Server flaw to add machines to a cryptocurrency botnet, researchers say.
Improving the Vulnerability Reporting Process With 5 Steps
Commentary  |  4/22/2021  | 
Follow these tips for an effective and positive experience for both the maintainer and external vulnerability reporter.
University Suspends Project After Researchers Submitted Vulnerable Linux Patches
News  |  4/22/2021  | 
A Linux maintainer pledges to stop taking code submissions from the University of Minnesota after a research team purposely submitted vulnerabilities to show software supply chain weaknesses.
Name That Toon: Greetings, Earthlings
Commentary  |  4/22/2021  | 
Caption time! Come up with something out of this world for Dark Reading's latest contest, and our panel of experts will reward the winner with a $25 Amazon gift card.
Looking for Greater Security Culture? Ask an 8-Bit Plumber
Commentary  |  4/22/2021  | 
After 40 years of navigating catastrophes, video game character Mario can help us with a more intelligent approach to DevOps and improving security culture.
Justice Dept. Creates Task Force to Stop Ransomware Spread
Quick Hits  |  4/21/2021  | 
One goal of the group is to take down the criminal ecosystem that enables ransomware, officials say.
Zero-Day Flaws in SonicWall Email Security Tool Under Attack
News  |  4/21/2021  | 
Three zero-day vulnerabilities helped an attacker install a backdoor, access files and emails, and move laterally into a target network.
Business Email Compromise Costs Businesses More Than Ransomware
Commentary  |  4/21/2021  | 
Ransomware gets the headlines, but business paid out $1.8 billion last year to resolve BEC issues, according to an FBI report.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23872
PUBLISHED: 2021-05-12
Privilege Escalation vulnerability in the File Lock component of McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by manipulating a symbolic link in the IOTL interface.
CVE-2021-23891
PUBLISHED: 2021-05-12
Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by impersonating a client token which could lead to the bypassing of MTP self-defense.
CVE-2021-23892
PUBLISHED: 2021-05-12
By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux Threat Prevention and Firewall (ENSL TP/FW) installation process, a local user can perform a privilege escalation attack to obtain administrator privileges for the purpose of executing arbitra...
CVE-2020-36289
PUBLISHED: 2021-05-12
Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the QueryComponentRendererValue!Default.jspa endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and fro...
CVE-2021-32606
PUBLISHED: 2021-05-11
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)