Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Threat Intelligence
Page 1 / 2   >   >>
Research Casts Doubt on Value of Threat Intel Feeds
News  |  8/14/2020  | 
Two commercial threat intelligence services and four open source feeds rarely provide the same information, raising questions about how security teams should gauge their utility.
DHS CISA Warns of Phishing Emails Rigged with KONNI Malware
Quick Hits  |  8/14/2020  | 
Konni is a remote administration tool cyberattackers use to steal files, capture keystrokes, take screenshots, and execute malicious code.
RedCurl APT Group Hacks Global Companies for Corporate Espionage
News  |  8/13/2020  | 
Researchers analyze a presumably Russian-speaking APT group that has been stealing corporate data since 2018.
Boeing's DEF CON Debut a Sign of the Times
News  |  8/13/2020  | 
In the wake of a stalemate between the airplane manufacturer and a security researcher over vulns found in its 787 aircraft's network, Boeing says it's ready to "embrace" the hacker community.
NSA & FBI Disclose New Russian Cyberespionage Malware
Quick Hits  |  8/13/2020  | 
APT 28, aka Fancy Bear, is deploying the Drovorub malware designed for Linux systems as part of cyber-espionage operations.
Emotet Return Brings New Tactics & Evasion Techniques
News  |  8/13/2020  | 
Security researchers tracking Emotet report its reemergence brings new tricks, including new evasion techniques to bypass security tools.
FireEye Announces New Bug-Bounty Program
Quick Hits  |  8/12/2020  | 
The program, administered by Bugcrowd, will pay bounties of up to $2,500 per vulnerability.
SANS Security Training Firm Hit with Data Breach
Quick Hits  |  8/12/2020  | 
A phishing email allowed an attacker to compromise a SANS employee's email environment, the organization reports.
Microsoft Patches 120 Vulnerabilities, Two Zero-Days
News  |  8/11/2020  | 
The August 2020 Patch Tuesday marks the sixth month in a row Microsoft released patches for more than 110 vulnerabilities.
Zoom Vulnerabilities Demonstrated in DEF CON Talk
Quick Hits  |  8/11/2020  | 
A security researcher demonstrated multiple vulnerabilities, two of which could let an attacker read and steal user data.
17 Essential Stats About the State of Consumer Privacy
Slideshows  |  8/11/2020  | 
These illuminating numbers offer a glimpse into current consumer attitudes and enterprise readiness for protecting their customers' personal data.
Q2 DDoS Attacks Triple Year Over Year: Report
Quick Hits  |  8/10/2020  | 
Distributed denial-of-service attacks have stayed consistently high throughout 2020, a shift from normal attack trends that researchers attribute to COVID-19.
Vulnerability Prioritization: Are You Getting It Right?
Commentary  |  8/10/2020  | 
Developers must find a way to zero in on the security vulns that present the most risk and quickly address them without slowing down the pace of development.
Digital Clones Could Cause Problems for Identity Systems
News  |  8/8/2020  | 
Three fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people is merely a matter of integrating the systems.
400+ Qualcomm Chip Vulnerabilities Threaten Millions of Android Phones
News  |  8/7/2020  | 
Security researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones.
Dark Reading Video News Desk Returns to Black Hat
News  |  8/6/2020  | 
UPDATED: Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!
Information Operations Spotlighted at Black Hat as Election Worries Rise
News  |  8/6/2020  | 
From Russia's "best-in-class" efforts at widening social divides in Western democracies to China's blunt attacks on dissidents, information operations are becoming a greater threat, says a Stanford researcher.
Ripple20: More Vulnerable Devices Identified
Quick Hits  |  8/6/2020  | 
Security researchers find 34 additional vendors, and 47 devices, affected by the widespread Ripple20 vulnerabilities.
Russian Election Interference: Whats Next?
News  |  8/5/2020  | 
Nate Beach-Westmoreland gives a look back at the past 10 years of Russian election interference and disinformation campaigns. What can we learn from the past and what should we expect as the 2020 US presidential election approaches?
Microsoft Teams Vulnerable to Patch Workaround, Researchers Report
News  |  8/5/2020  | 
Attackers could work around an earlier patch and use Microsoft Teams Updater to download binaries and payloads.
Microsoft Paid $13.7M in Bug Bounty Rewards in 2019-2020
Quick Hits  |  8/5/2020  | 
The 2019-2020 program year awarded 327 security researchers through 15 bounty programs, with a largest reward of $200,000.
How Ransomware Threats Are Evolving & How to Spot Them
News  |  8/4/2020  | 
A series of new reports explains how ransomware attackers are changing techniques and how organizations can spot stealthy criminals.
New Spin on a Longtime DNS Intel Tool
News  |  8/4/2020  | 
Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features.
Google & Amazon Replace Apple as Phishers' Favorite Brands
Quick Hits  |  8/4/2020  | 
Google and Amazon were the most imitated brands in the second quarter, knocking out Apple.
Travel Management Firm CWT Pays $4.5M to Ransomware Attackers
Quick Hits  |  8/3/2020  | 
Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.
3 Arrested for Massive Twitter Breach
Quick Hits  |  7/31/2020  | 
Three individuals aged 17, 19, and 22 have been charged for their alleged roles in the massive July 15 Twitter attack.
Twitter: Employees Compromised in Phone Spear-Phishing Attack
Quick Hits  |  7/31/2020  | 
The attack earlier this month started with a spear-phishing attack targeting Twitter employees, the company says in a new update.
Dark Web Travel Fraudsters Left Hurting From Lockdowns
News  |  7/30/2020  | 
Shadow travel businesses that depend on loyalty program fraud have been impacted just like the legitimate travel orgs they prey on.
Black Hat Virtually: An Important Time to Come Together as a Community
Commentary  |  7/30/2020  | 
The significance of this year's event hasn't changed a whit. It's an opportunity to share what we've learned, and plan how to protect each other and the public for the remainder of the pandemic and beyond.
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
News  |  7/29/2020  | 
A flaw in the GRUB2 bootloader affects most Linux devices and some Windows computers using UEFI Secure Boot.
70,000+ WordPress Sites Affected by Critical Plug-in Flaw
Quick Hits  |  7/29/2020  | 
A vulnerability in the wpDiscuz plug-in could let attackers remotely execute code on the servers of affected websites.
Lazarus Group Shifts Gears with Custom Ransomware
News  |  7/28/2020  | 
The North Korea-linked APT group has developed its own ransomware strain to better conduct financial theft, researchers report.
7.5M Banking Customers Affected in Dave Security Breach
Quick Hits  |  7/28/2020  | 
The financial services app confirms user data was compromised in a data breach at its former third-party provider, WayDev.
As Businesses Move to the Cloud, Cybercriminals Follow Close Behind
Commentary  |  7/28/2020  | 
In the wake of COVID-19, data theft is by far the top tactic, followed by cryptomining and ransomware.
Block/Allow: The Changing Face of Hacker Linguistics
News  |  7/27/2020  | 
Terms such as "whitelist," "blacklist," "master," and "slave" are being scrutinized again and by a wider range of tech companies than ever before.
Garmin Takes App & Services Offline After Suspected Ransomware Attack
Quick Hits  |  7/24/2020  | 
Wearables company Garmin shut down its website, app, call centers, and other services in the aftermath of a security incident.
Email Security Features Fail to Prevent Phishable 'From' Addresses
News  |  7/24/2020  | 
The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers.
Twilio Security Incident Shows Danger of Misconfigured S3 Buckets
News  |  7/23/2020  | 
Twilio says attackers accessed its misconfigured cloud storage system and altered a copy of the JavaScriptSDK it shares with customers.
CouchSurfing Investigates Potential Data Breach
Quick Hits  |  7/23/2020  | 
The service has reportedly hired a security firm after 17 million user records were found on a public hacking forum.
Deepfakes & James Bond Research Project: Cool but Dangerous
Commentary  |  7/23/2020  | 
Open source software for creating deepfakes is getting better and better, to the chagrin of researchers
8 Cybersecurity Themes to Expect at Black Hat USA 2020
Slideshows  |  7/23/2020  | 
Here are the trends and topics that'll capture the limelight at this year's virtual event.
North Korea's Lazarus Group Developing Cross-Platform Malware Framework
News  |  7/22/2020  | 
The APT group, known for its attack on Sony Pictures in 2014, has created an "advanced malware framework" that can launch and manage attacks against systems running Windows, MacOS, and Linux.
The InfoSec Barrier to AI
Commentary  |  7/22/2020  | 
Information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem. Conversely, AI is causing headaches for CISOs. Here's why.
DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records
News  |  7/21/2020  | 
China, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.
Leading Through Uncertainty: Be Proactive in Your Dark Web Intelligence Strategy
Commentary  |  7/21/2020  | 
Having a strong Dark Web intelligence posture helps security teams understand emerging vulnerability trends.
SIGRed: What You Should Know About the Windows DNS Server Bug
News  |  7/20/2020  | 
DNS experts share their thoughts on the wormable vulnerability and explain why it should be a high priority for businesses.
England 'Test and Trace' Program Violates GDPR Privacy Law
Quick Hits  |  7/20/2020  | 
The UK government confirms the program launched in May without a Data Protection Impact Assessment, as required under GDPR.
Cybercriminals Targeted Streaming Services to Provide Pandemic Entertainment
News  |  7/17/2020  | 
Prior to 2020, about 1 in 5 credential attacks targeted video services, but that's nothing compared to the first quarter of 2020, according to newly published data.
Russian Cyberattacks Target COVID-19 Research, Vaccine Development
Quick Hits  |  7/16/2020  | 
Government agencies in the US, UK, and Canada report Russian group Cozy Bear is targeting organizations developing coronavirus vaccines.
Cryptocurrency Scam Spreads Across High-Profile Twitter Accounts
Quick Hits  |  7/15/2020  | 
Twitter accounts belonging to former president Barack Obama, Joe Biden, Jeff Bezos, Elon Musk, and Bill Gates are among those hijacked in a massive cryptocurrency scam.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.