Despite warnings from Health-ISAC and the NCC Group, the remote access software maker says defense-in-depth kept customers' data safe from Midnight Blizzard.
...moreTotal Articles Found: 91
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2024-06-28 21:22:05
Popularity: 38
Author: Dark Reading Staff
Despite warnings from Health-ISAC and the NCC Group, the remote access software maker says defense-in-depth kept customers' data safe from Midnight Blizzard.
...morePublished: 2024-06-05 19:01:42
Popularity: 7
Author: Dark Reading Staff
Hijacking malware gets spread through TikTok's direct messaging and doesn't require the victim to click links or download anything.
...morePublished: 2024-03-05 21:55:11
Popularity: 5
Author: Dark Reading Staff
The retired US Army lieutenant colonel faces up to 10 years in prison if convicted of sharing secret information about the Russia-Ukraine war with a scammer posing as romantic connection.
...morePublished: 2024-02-21 21:46:12
Popularity: 183
Author: Dark Reading Staff
Researchers tested their theory on nine chargers, each different and available to consumers, and found them all vulnerable to their attacks.
...morePublished: 2024-02-20 21:38:03
Popularity: 21
Author: Dark Reading Staff
Improper content filtering in a core function allows multiple paths to exploitation for CVE-2024-21726.
...morePublished: 2024-02-01 22:20:00
Popularity: 8
Author: Dark Reading Staff
The threat actor behind the campaign is still unknown, but it shares some similarities with other cyptojacking groups.
...morePublished: 2023-10-09 19:15:30
Popularity: 38
Author: Dark Reading Staff, Dark Reading
Thousands of devices, including D-Link and Zyxel gear, remain vulnerable to takeover despite the availability of patches for the several bugs being exploited by IZ1H9 campaign.
...morePublished: 2023-10-11 18:15:00
Popularity: 32
Author: Dark Reading Staff, Dark Reading
CISA flags use-after-free bug now being exploited in the wild.
...morePublished: 2023-10-20 18:05:00
Popularity: 17
Author: Dark Reading Staff, Dark Reading
Users could hold up to five SIM cards previously, but now they can only have two; it's a move that the government says is intended to cut down mobile spam levels.
...morePublished: 2023-09-20 22:00:00
Popularity: 2
Author: Dark Reading Staff, Dark Reading
The Swedish maker of Yubikeys has merged with special purpose acquisition company ACQ Bure.
...morePublished: 2023-06-22 15:53:52
Popularity: 4887
Author: Dark Reading Staff, Dark Reading
A ready-made, low-complexity path to pwning the popular enterprise VPN clients for remote workers is now circulating in the wild.
...morePublished: 2023-05-11 19:00:00
Popularity: 37
Author: Dark Reading Staff, Dark Reading
Corgan got FBI involved to track down the cybercriminal, who had stolen from other artists as well, he said.
...morePublished: 2023-05-22 19:29:00
Popularity: 32
Author: Dark Reading Staff, Dark Reading
The technology conglomerate has until later this year to end its transfer of European user's data across the Atlantic.
...morePublished: 2023-05-26 17:32:00
Popularity: 28
Author: Dark Reading Staff, Dark Reading
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
...morePublished: 2023-05-31 21:08:00
Popularity: 192
Author: Dark Reading Staff, Dark Reading
The newly found misconfigured cloud services are discovered just two weeks after an initial data breach affecting millions came to light.
...morePublished: 2023-05-30 21:39:00
Popularity: 48
Author: Dark Reading Staff, Dark Reading
On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.
...morePublished: 2023-04-06 19:20:29
Popularity: 94
Author: Dark Reading Staff, Dark Reading
A flaw in Twitter code allows bot abuse to trick the algorithm into suppressing certain accounts.
...morePublished: 2023-03-24 20:05:00
Popularity: 106
Author: Dark Reading Staff, Dark Reading
GitHub hastens to replace its RSA SSH host key after an exposure mishap threatens users with man-in-the-middle attacks and organization impersonation.
...morePublished: 2023-01-30 19:00:00
Popularity: 67
Author: Dark Reading Staff, Dark Reading
The Instagram rate-limiting bug, found by a rookie hunter, could be exploited to bypass Facebook 2FA in vulnerable apps, researcher reports.
...morePublished: 2023-02-01 14:18:08
Popularity: 24
Author: Dark Reading Staff, Dark Reading
Google Fi mobile customers have been alerted that their SIM card serial numbers, phone numbers, and other data were exposed in T-Mobile hack.
...morePublished: 2023-02-08 22:05:00
Popularity: 66
Author: Dark Reading Staff, Dark Reading
Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls.
...morePublished: 2022-11-28 18:11:09
Popularity: 59
Author: Dark Reading Staff, Dark Reading
Meta has been found in violation of Europe's GDPR rules requiring the social media giant to protect user data by "design and default."
...morePublished: 2022-10-11 17:49:46
Popularity: 66
Author: Dark Reading Staff, Dark Reading
Exposed code included private key for Intel Boot Guard, meaning it can no longer be trusted, according to a researcher.
...morePublished: 2022-10-17 17:54:37
Popularity: 18
Author: Dark Reading Staff, Dark Reading
Main driver for the change: "Plaintext SMS messages are inherently insecure."
...morePublished: 2022-10-05 20:00:00
Popularity: 59
Author: Dark Reading Staff, Dark Reading
With just one malformed Zigbee frame, attackers could take over certain Ikea smart lightbulbs, leaving users unable to turn the lights down.
...morePublished: 2022-08-16 18:51:56
Popularity: 19
Author: Dark Reading Staff, Dark Reading
Just as one crop of malware-laced software packages is taken down from the popular Python code repository, a new host arrives, looking to steal a raft of data.
...morePublished: 2022-08-30 20:00:00
Popularity: 19
Author: Dark Reading Staff, Dark Reading
Analysts find five cookie-stuffing extensions, including one that's Netflix-themed, that track victim browsing and insert rogue IDs into e-commerce sites to rack up fake affiliate payments.
...morePublished: 2022-07-18 17:55:01
Popularity: 29
Author: Dark Reading Staff, Dark Reading
An ongoing campaign is actively targeting the vulnerability in the Kaswara Modern WPBakery Page Builder Addon, which is still installed on up to 8,000 sites, security analysts warn.
...morePublished: 2022-07-12 22:42:37
Popularity: 23
Author: Dark Reading Staff, Dark Reading
Python's most popular package manager is intent on securing the supply chain by requiring developers to enable two-factor authentication.
...morePublished: 2022-06-17 18:53:38
Popularity: 4200
Author: Dark Reading Staff, Dark Reading
The code injection vulnerability is being actively exploited in the wild, researchers say.
...morePublished: 2022-06-13 19:43:16
Popularity: 9178
Author: Dark Reading Staff, Dark Reading
Public Travis CI logs loaded with GitHub, AWS, Docker Hub account tokens, and other sensitive data could be leveraged for lateral cloud attacks.
...morePublished: 2022-05-03 20:35:19
Popularity: 451
Author: Dark Reading Staff, Dark Reading
The same infrastructure traced back to Russian-speaking threat group Nobelium is being used to set up misspelled domain names, presaging impersonation attacks bent on credential harvesting, analysts say.
...morePublished: 2022-01-11 19:05:00
Popularity: 20
Author: Dark Reading Staff, Dark Reading
The most serious of the five vulnerabilities disclosed today can lead to unauthenticated remote code execution on affected devices.
...morePublished: 2021-07-19 18:53:00
Popularity: 28
Author: Dark Reading Staff
An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world.
...morePublished: 2021-07-07 18:54:00
Popularity: 16
Author: Dark Reading Staff
The deal was announced the same day ZeroFox bought Dark Web intelligence firm Vigilante as a wave of security M&A continues.
...morePublished: 2021-06-22 17:26:00
Popularity: 18
Author: Dark Reading Staff
The framework, now available through MITRE, provides countermeasures to attacks.
...morePublished: 2021-06-25 15:00:00
Popularity: 27
Author: Dark Reading Staff
Andrii Kolpakov, who served as a high-level pentester for the criminal group, was also ordered to pay $2.5 million in restitution.
...morePublished: 2021-06-17 20:50:00
Popularity: 5
Author: Dark Reading Staff
The "Supply chain Levels for Software Artifacts" aims to ensure the integrity of components throughout the software supply chain.
...morePublished: 2021-06-02 17:42:00
Popularity: 20
Author: Dark Reading Staff
The plug-in under active attack has been installed on more than 17,000 websites, say researchers.
...morePublished: 2021-05-25 18:32:00
Popularity: 21
Author: Dark Reading Staff
FBI says sales from illicit online shop deer.io exceeded $17 million
...morePublished: 2021-05-26 20:32:00
Popularity: 424
Author: Dark Reading Staff
Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.
...morePublished: 2021-05-11 21:02:00
Popularity: 3023
Author: Dark Reading Staff
The vulnerability is being exploited in limited attacks against Adobe Reader users on Windows.
...morePublished: 2021-05-04 21:21:00
Popularity: 34
Author: Dark Reading Staff
Published: 2021-04-29 19:49:00
Popularity: 78
Author: Dark Reading Staff
Student researcher is concerned security gap may exist on many other sites.
...morePublished: 2021-01-06 22:00:00
Popularity: 583
Author: Dark Reading Staff
Leaked information includes source code of Nissan mobile apps, diagnostics tool, and market research tools and data, among other assets.
...morePublished: 2021-01-04 19:10:00
Popularity: 151
Author: Dark Reading Staff
The wireless carrier has suffered a data breach for the fourth time since 2018.
...morePublished: 2020-12-22 16:35:00
Popularity: 83
Author: Dark Reading Staff
The United States and international partners shut down three bulletproof hosting services used to facilitate criminal activity.
...morePublished: 2020-12-21 22:25:00
Popularity: 135
Author: Dark Reading Staff
The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code.
...morePublished: 2020-09-08 19:00:00
Popularity: 95
Author: Dark Reading Staff
The vulnerability in WordPress File Manager could allow a malicious actor to take over the victim's website.
...morePublished: 2020-08-17 18:00:00
Popularity: 268
Author: Dark Reading Staff
Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.
...morePublished: 2020-07-29 19:10:00
Popularity: 110
Author: Dark Reading Staff
A vulnerability in the wpDiscuz plug-in could let attackers remotely execute code on the servers of affected websites.
...morePublished: 2020-07-23 17:15:00
Popularity: 23
Author: Dark Reading Staff
The service has reportedly hired a security firm after 17 million user records were found on a public hacking forum.
...morePublished: 2020-06-16 20:45:00
Popularity: 12
Author: Dark Reading Staff
The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.
...morePublished: 2020-06-17 21:40:00
Popularity: 101
Author: Dark Reading Staff
The videoconferencing company now says it will offer end-to-end encryption to all users beginning in July.
...morePublished: 2020-06-16 20:45:00
Popularity: 69
Author: Dark Reading Staff
The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.
...morePublished: 2020-06-10 17:45:00
Popularity: 183
Author: Dark Reading Staff
Researchers find 12 Android applications disguised as official COVID-19 contact tracing apps installing malware onto devices.
...morePublished: 2020-05-28 18:15:00
Popularity: 114
Author: Dark Reading Staff
The Russian military group has been exploiting a flaw in the Exim mail transfer agent since last August, the NSA reports.
...morePublished: 2020-05-07 16:15:00
Popularity: 73
Author: Dark Reading Staff
The company's first acquisition to date is part of a 90-day plan to improve security in its video communications platform.
...morePublished: 2020-04-06 15:45:00
Popularity: 103
Author: Dark Reading Staff
The latest release of Firefox brings fixes for two Critical vulnerabilities already seen exploited in the wild.
...morePublished: 2020-03-20 16:45:00
Popularity: 90
Author: Dark Reading Staff
The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices.
...morePublished: 2020-03-02 17:45:00
Popularity: 265
Author: Dark Reading Staff
Visser Precision has confirmed a security incident likely caused by the data-stealing DoppelPaymer ransomware.
...morePublished: 2020-02-28 01:00:00
Popularity: 170
Author: Dark Reading Staff
Customers for the controversial facial recognition company were detailed in a log file leaked to news organizations.
...morePublished: 2020-01-30 18:10:00
Popularity: 138
Author: Dark Reading Staff
A remote code execution flaw enabled a breach of UN offices in Geneva and Vienna, as well as the Office of the High Commissioner for Human Rights.
...morePublished: 2020-01-29 00:30:00
Popularity: 134
Author: Dark Reading Staff
Hackers claiming to be from the hacktivist group OurMine temporarily took over Twitter accounts of the NFL and several teams in the league.
...morePublished: 2020-01-24 21:30:00
Popularity: 128
Author: Dark Reading Staff
Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.
...morePublished: 2020-01-09 01:45:00
Popularity: 205
Author: Dark Reading Staff
The attack, still under investigation, hit early in the morning of Jan. 7.
...morePublished: 2019-12-17 16:40:00
Popularity: 92
Author: Dark Reading Staff
David Tinley, 62, rigged software he wrote for the company starting in 2014 and into 2016, causing the programs to fail.
...morePublished: 2019-12-10 20:50:00
Popularity: 70
Author: Dark Reading Staff
Researchers found three broad types of vulnerabilities, one of which should be particularly concerning to consumers.
...morePublished: 2019-10-08 20:55:00
Popularity: 219
Author: Dark Reading Staff
Vulnerabilities with Pulse Secure, Fortinet, and Palo Alto Networks VPNs are called out in the advisory.
...morePublished: 2019-09-30 15:00:00
Popularity: 285
Author: Dark Reading Staff
The same attacker was reportedly behind the Collection #1 and Collection #2 data dumps earlier this year.
...morePublished: 2019-09-27 14:30:00
Popularity: 145
Author: Dark Reading Staff
The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.
...morePublished: 2019-09-16 18:00:00
Popularity: 76
Author: Dark Reading Staff
US appeals court said a company can legally use publicly available LinkedIn account information.
...morePublished: 2019-08-23 15:30:00
Popularity: 70
Author: Dark Reading Staff
Virtual machine giant's big cloud move includes plans to shell out $2.7 billion in stock transactions for Pivotal Software.
...morePublished: 2019-08-27 21:00:00
Popularity: 110
Author: Dark Reading Staff
A subset of customers for the company's Incapsula web application firewall had their email addresses, hashed/salted passwords, and more open to unauthorized access, Imperva announced.
...morePublished: 2019-08-13 16:20:00
Popularity: 163
Author: Dark Reading Staff
Cybercriminals reportedly stole the information from an exposed MongoDB database on a third-party server.
...morePublished: 2019-08-14 15:30:00
Popularity: 177
Author: Dark Reading Staff
Thousands of organizations, including banks, governments, and the UK Metropolitan Police, use the biometric security tool to authenticate users.
...morePublished: 2019-07-26 19:10:00
Popularity: 141
Author: Dark Reading Staff
Marcus Hutchins, the researcher known for stopping WannaCry, avoids jail time over charges of creating and distributing Kronos malware.
...morePublished: 2019-07-10 17:30:00
Popularity: 92
Author: Dark Reading Staff
GE Healthcare has released a statement claiming the bug is not in the machine itself and does not pose direct risk to patients.
...morePublished: 2019-07-04 03:30:00
Popularity: 186
Author: Dark Reading Staff
A settlement with the FTC should mean comprehensive security upgrades for D-Link routers and IP camera.
...morePublished: 2019-06-28 15:40:00
Popularity: 218
Author: Dark Reading Staff
Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.
...morePublished: 2019-06-05 16:15:00
Popularity: 279
Author: Dark Reading Staff
The National Security Agency joins Microsoft in urging Windows admins to patch wormable bug CVE-2019-0708.
...morePublished: 2019-04-19 16:00:00
Popularity: 73
Author: Dark Reading Staff
For the last month, an unknown individual or group has been sharing data and hacking tools belonging to Iranian hacker group APT34.
...morePublished: 2019-03-13 19:00:00
Popularity: 67
Author: Dark Reading Staff
Incident leaves GPS units showing a location in England and a date 17 years in the future.
...morePublished: 2019-03-06 13:00:00
Popularity: 5
Author: Dark Reading Staff
WhiteHat Security will continue to operate as an independent subsidiary of NTT Security following the deal.
...morePublished: 2024-05-16 12:48:06
Popularity: 15
Author: Dark Reading Staff
Google has rolled an emergency patch for CVE-2024-4947, the third Chrome zero-day it's addressed in the past week.
...morePublished: 2024-05-17 18:03:51
Popularity: 8
Author: Dark Reading Staff
Financial firms covered under new regulations will be required to establish a clear response and communications plan for customer data breaches.
...morePublished: 2024-07-01 20:35:22
Popularity: 12
Author: Dark Reading Staff
If security researchers can execute a guest-to-host attack using a zero-day vulnerability in the KVM open source hypervisor, Google will make it worth their while.
...morePublished: 2024-07-18 21:04:59
Popularity: 14
Author: Dark Reading Staff
Though the number of victims has risen, the actual number of breaches has gone down, as fewer, bigger breaches affect more individuals.
...morePublished: 2024-07-26 20:36:57
Popularity: 7
Author: Dark Reading Staff
Researchers track the healthcare sector as experiencing the biggest financial losses, with banking and transportation following close behind.
...morePublished: 2024-09-16 21:04:22
Popularity: 8
Author: Dark Reading Staff
Three days after Ivanti published an advisory about the high-severity vulnerability CVE-2024-8190, threat actors began to abuse the flaw.
...morePublished: 2024-10-10 21:10:13
Popularity: 24
Author: Dark Reading Staff
The bug is already being exploited in the wild, but Firefox has provided patches for those who may be vulnerable.
...more