Summary

Top Articles:

  • OpenSea NFT Marketplace Faces Insider Hack
  • Exposed Travis CI API Leaves All Free-Tier Users Open to Attack
  • Patch Now: Cisco AnyConnect Bug Exploit Released in the Wild
  • WordPress Plug-in Ninja Forms Issues Update for Critical Bug
  • Adobe Issues Patch for Acrobat Zero-Day
  • Multiple Windows, Adobe Zero-Days Anchor Knotweed Commercial Spyware
  • Nissan Source Code Leaked via Misconfigured Git Server
  • SolarWinds Attackers Gear Up for Typosquatting Attacks
  • Google Discovers New Rowhammer Attack Technique
  • 'Log in with...' Feature Allows Full Online Account Takeover for Millions

'RegreSSHion' Bug Threatens Takeover of Millions of Linux Systems

Published: 2024-07-01 19:38:55

Popularity: 25

Author: Tara Seals, Managing Editor, News, Dark Reading

LLM Says: "Linux takeover"

The high-severity CVE-2024-6387 in OpenSSH is a reintroduction of a 2006 flaw, and it allows unauthenticated RCE as root.

...more

TeamViewer Credits Network Segmentation for Rebuffing APT29 Attack

Published: 2024-06-28 21:22:05

Popularity: 38

Author: Dark Reading Staff

LLM Says: "Network shields up"

Despite warnings from Health-ISAC and the NCC Group, the remote access software maker says defense-in-depth kept customers' data safe from Midnight Blizzard.

...more

Google Opens $250K Bug Bounty Contest for VM Hypervisor

Published: 2024-07-02 23:50:14

Popularity: None

Author: Dark Reading

LLM Says: "bug bounty party"

If security researchers can execute a guest-to-host attack using a zero-day vuln in the KVM open source hypervisor, Google will make it worth their while.

...more

The Software Licensing Disease Infecting Our Nation's Cybersecurity

Published: 2024-06-18 14:00:00

Popularity: 10

Author: Steve Weber

LLM Says: ""Infection detected""

Forcing Microsoft to compete fairly is the most important next step in building a better defense against foreign actors.

...more

Critical VMware Bugs Open Swaths of VMs to RCE, Data Theft

Published: 2024-06-18 20:23:24

Popularity: 32

Author: Nate Nelson, Contributing Writer

LLM Says: ""VMware hacked""

A trio of bugs could allow hackers to escalate privileges and remotely execute code on virtual machines deployed across cloud environments.

...more

Hijacking Scheme Takes Over High-Profile TikTok Accounts

Published: 2024-06-05 19:01:42

Popularity: 7

Author: Dark Reading Staff

LLM Says: "Hacked!"

Hijacking malware gets spread through TikTok's direct messaging and doesn't require the victim to click links or download anything.

...more

Hotel Check-in Kiosks Expose Guest Data, Room Keys

Published: 2024-06-07 16:55:39

Popularity: 5

Author: Nathan Eddy, Contributing Writer

LLM Says: "data breach"

CVE-2024-37364 affects hospitality kiosks from Ariane Systems, which are used for self-check-in at more than 3,000 hotels worldwide.

...more

Critical Security Flaw Exposes 1 Million WordPress Sites to SQL Injection

Published: 2024-04-05 11:34:21

Popularity: None

Author: Elizabeth Montalbano, Contributing Writer

A researcher received a $5,500 bug bounty for discovering a vulnerability (CVE-2024-2879) in LayerSlider, a plug-in with more than a million active installations.

...more

300K Internet Hosts at Risk for 'Devastating' Loop DoS Attack

Published: 2024-03-21 18:17:06

Popularity: 8

Author: Elizabeth Montalbano, Contributing Writer

Attackers can create a self-perpetuating, infinite scenario in such a way that volumes of traffic overwhelm network resources indefinitely.

...more

Session Takeover Bug in AWS Apache Airflow Reveals Larger Cloud Risk

Published: 2024-03-21 17:13:23

Popularity: 13

Author: Nate Nelson, Contributing Writer

A bug exposed users of an AWS workflow management service to cookie tossing, but behind the scenes lies an even deeper issue that runs across all of the top cloud services.

...more

Alabama Under DDoS Cyberattack by Russian-Backed Hacktivists

Published: 2024-03-14 19:43:25

Popularity: 125

Author: None

The hacktivist group Anonymous Sudan claims credit for a cyberattack that disrupted Alabama state government earlier this week.

...more

How to Ensure Open Source Packages Are Not Landmines

Published: 2024-03-08 03:00:22

Popularity: None

Author: Agam Shah, Contributing Writer

CISA and OpenSSF jointly published new guidance recommending technical controls to make it harder for developers to bring malicious software components into code.

...more

Russia-Sponsored Cyberattackers Infiltrate Microsoft's Code Base

Published: 2024-03-08 17:22:50

Popularity: 45

Author: Tara Seals, Managing Editor, News, Dark Reading

The Midnight Blizzard APT is mounting a sustained, focused cyber campaign against the computing kahuna, using secrets it stole from emails back in January.

...more

Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory

Published: 2024-03-10 13:13:39

Popularity: None

Author: Nathan Eddy, Contributing Writer

The proof-of-concept exploits for Atlassian Confluence would enable arbitrary code execution without requiring file system access.

...more

Army Vet Spills National Secrets to Fake Ukrainian Girlfriend

Published: 2024-03-05 21:55:11

Popularity: 5

Author: Dark Reading Staff

The retired US Army lieutenant colonel faces up to 10 years in prison if convicted of sharing secret information about the Russia-Ukraine war with a scammer posing as romantic connection.

...more

'VoltSchemer' Hack Allows Wireless Charger Takeovers

Published: 2024-02-21 21:46:12

Popularity: 183

Author: Dark Reading Staff

Researchers tested their theory on nine chargers, each different and available to consumers, and found them all vulnerable to their attacks.

...more

'KeyTrap' DNS Bug Threatens Widespread Internet Outages

Published: 2024-02-20 18:16:24

Popularity: 92

Author: Becky Bracken, Editor, Dark Reading

Thanks to a 24-year-old security vulnerability tracked as CVE-2023-50387, attackers could stall DNS servers with just a single malicious packet, effectively taking out wide swaths of the Internet.

...more

Joomla XSS Bugs Open Millions of Websites to RCE

Published: 2024-02-20 21:38:03

Popularity: 21

Author: Dark Reading Staff

Improper content filtering in a core function allows multiple paths to exploitation for CVE-2024-21726.

...more

CISA Orders Ivanti VPN Appliances Disconnected: What to Do

Published: 2024-02-01 21:00:00

Popularity: 4

Author: Fahmida Y. Rashid, Managing Editor, Features, Dark Reading

US federal agencies have to disconnect, rebuild, and reconfigure all Ivanti Connect Secure and Policy Secure VPN appliances. This Tech Tip lists all the steps that need to happen.

...more

'Commando Cat' Is Second Campaign of the Year Targeting Docker

Published: 2024-02-01 22:20:00

Popularity: 8

Author: Dark Reading Staff

The threat actor behind the campaign is still unknown, but it shares some similarities with other cyptojacking groups.

...more

Cloudflare Falls Victim to Okta Breach, Atlassian Systems Cracked

Published: 2024-02-02 13:00:00

Popularity: 16

Author: Tara Seals, Managing Editor, News, Dark Reading

The cyberattackers, believed to be state sponsored, didn't get far into Cloudflare's global network, but not for lack of trying.

...more

Google Play Used to Spread 'Patchwork' APT's Espionage Apps

Published: 2024-02-02 15:23:33

Popularity: 7

Author: Becky Bracken, Editor, Dark Reading

The Indian state-sponsored cyberattackers lurked in Google's official app store, distributing a new RAT and spying on Pakistanis.

...more

SolarWinds Files Motion to Dismiss SEC Lawsuit

Published: 2024-01-29 21:38:00

Popularity: 7

Author: Becky Bracken, Editor, Dark Reading

Responding to SEC charges, SolarWinds fired back with a detailed defense of how a Russian-backed cyber espionage attack on its system was handled.

...more

The CISO Role Undergoes a Major Evolution

Published: 2024-01-25 15:00:00

Popularity: 11

Author: Mark Bowling

Post-SolarWinds, it's no longer enough for chief information security officers to remain compliant and call it a day.

...more

Google Kubernetes Clusters Suffer Widespread Exposure to External Attackers

Published: 2024-01-25 16:40:00

Popularity: 16

Author: Elizabeth Montalbano, Contributing Writer

Misunderstanding the permissions of an authentication group in Google Kubernetes Engine (GKE) opens millions of containers to anyone with a Google account.

...more

ChatGPT Cybercrime Discussions Spike to Nearly 3K Posts on Dark Web

Published: 2024-01-24 21:25:00

Popularity: 165

Author: Kristina Beek, Associate Editor, Dark Reading

And there were an additional 3,000 comments posted to the Dark Web about the sale of stolen ChatGPT accounts.

...more

Newly ID'ed Chinese APT Hides Backdoor in Software Updates

Published: 2024-01-26 21:00:00

Popularity: 9

Author: Nate Nelson, Contributing Writer

The threat actor went more than half a decade before being discovered — thanks to a remarkable backdoor delivered in invisible adversary-in-the-middle attacks.

...more

Global TeamCity Exploitation Opens Door to SolarWinds-Style Nightmare

Published: 2023-12-13 23:26:00

Popularity: 5

Author: Tara Seals, Managing Editor, News, Dark Reading

Russia's APT29 is going after a critical RCE flaw in the JetBrains TeamCity software developer platform, prompting governments worldwide to issue an urgent warning to patch.

...more

Russian Water Utility Hacked in Retaliation for Kyivstar Hit

Published: 2023-12-21 21:15:00

Popularity: 13

Author: Becky Bracken, Editor, Dark Reading

Moscow's Rosvodokanal water-management company was ransacked by Ukraine-aligned Blackjack group, with reports that the company's IT infrastructure was "destroyed."

...more

Researchers Use AI to Jailbreak ChatGPT, Other LLMs

Published: 2023-12-07 20:52:00

Popularity: 20

Author: None

"Tree of Attacks With Pruning" is the latest in a growing string of methods for eliciting unintended behavior from a large language model.

...more

Rootkit Turns Kubernetes From Orchestration to Subversion

Published: 2023-11-22 16:15:25

Popularity: 22

Author: Robert Lemos, Contributing Writer, Dark Reading

Kubernetes compromises have usually led to attackers creating cryptomining containers, but the outcomes could be much worse, say researchers presenting at the Black Hat Europe conference.

...more

Kinsing Cyberattackers Debut 'Looney Tunables' Cloud Exploits

Published: 2023-11-06 22:57:00

Popularity: 32

Author: Tara Seals, Managing Editor, News, Dark Reading

Admins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and credentials.

...more

SEC Charges Against SolarWinds CISO Send Shockwaves Through Security Ranks

Published: 2023-10-31 21:35:00

Popularity: 43

Author: Becky Bracken, Editor, Dark Reading

The legal actions may have a chilling effect on hiring CISOs, who are already in short supply, but may also expose just how budget-constrained most security executives are.

...more

Patch Now: Massive RCE Campaign Wrangles Routers Into Botnet

Published: 2023-10-09 19:15:30

Popularity: 38

Author: Dark Reading Staff, Dark Reading

Thousands of devices, including D-Link and Zyxel gear, remain vulnerable to takeover despite the availability of patches for the several bugs being exploited by IZ1H9 campaign.

...more

'Looney Tunables' Linux Flaw Sees Snowballing Proof-of-Concept Exploits

Published: 2023-10-09 20:00:00

Popularity: 40

Author: Nathan Eddy, Contributing Writer, Dark Reading

Following the publication of the critical Linux security vulnerability, security specialists released PoC exploits to test the implications of CVE-2023-4911.

...more

Adobe Acrobat Reader Vuln Now Under Attack

Published: 2023-10-11 18:15:00

Popularity: 32

Author: Dark Reading Staff, Dark Reading

CISA flags use-after-free bug now being exploited in the wild.

...more

Microsoft Set to Retire Grunge-Era VBScript, to Cybercrime's Chagrin

Published: 2023-10-12 20:23:45

Popularity: 17

Author: Tara Seals, Managing Editor, News, Dark Reading

Popular malware like QakBot and DarkGate rely on VBScript, which dates back to 1996 — but their days are numbered now that Microsoft is finally deprecating the Windows programming language.

...more

SIM Card Ownership Slashed in Burkina Faso

Published: 2023-10-20 18:05:00

Popularity: 17

Author: Dark Reading Staff, Dark Reading

Users could hold up to five SIM cards previously, but now they can only have two; it's a move that the government says is intended to cut down mobile spam levels.

...more

Virtual Alarm: VMware Issues Major Security Advisory

Published: 2023-10-25 19:38:00

Popularity: 211

Author: Becky Bracken, Editor, Dark Reading

VMware vCenter Servers need immediate patch against critical RCE bug as race against threat actors begins.

...more

'Log in with...' Feature Allows Full Online Account Takeover for Millions

Published: 2023-10-24 13:00:00

Popularity: 285

Author: Elizabeth Montalbano, Contributor, Dark Reading

Hundreds of millions of users of Grammarly, Vidio, and the Indonesian e-commerce giant Bukalapak are at risk for financial fraud and credential theft due to OAuth misfires — and other online services likely have the same problems.

...more

Fake WinRAR PoC Exploit Conceals VenomRAT Malware

Published: 2023-09-26 15:23:51

Popularity: None

Author: Becky Bracken, Editor, Dark Reading

A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.

...more

Fake WinRAR PoC Exploit Conceals VenomRAT Malware

Published: 2023-09-20 20:09:00

Popularity: 52

Author: Tara Seals, Managing Editor, News, Dark Reading

A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.

...more

Yubico Goes Public

Published: 2023-09-20 22:00:00

Popularity: 2

Author: Dark Reading Staff, Dark Reading

The Swedish maker of Yubikeys has merged with special purpose acquisition company ACQ Bure.

...more

Cisco Moves Into SIEM With $28B Deal to Acquire Splunk

Published: 2023-09-22 00:42:00

Popularity: 43

Author: Jeffrey Schwartz, Contributing Writer, Dark Reading

Cisco's surprise agreement could reshape secure information and event management (SIEM) and extended detection and response (XDR) markets.

...more

Fake WinRAR PoC Exploit Conceals VenomRAT Malware

Published: 2023-09-26 12:37:49

Popularity: None

Author: Becky Bracken, Editor, Dark Reading

A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.

...more

Patch Now: Cisco AnyConnect Bug Exploit Released in the Wild

Published: 2023-06-22 15:53:52

Popularity: 4887

Author: Dark Reading Staff, Dark Reading

A ready-made, low-complexity path to pwning the popular enterprise VPN clients for remote workers is now circulating in the wild.

...more

Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace

Published: 2023-06-02 21:02:58

Popularity: None

Author: Contributor, Dark Reading

No activity logging in the free subscription for Google's Web-based productivity suite exposes enterprises to insider and other threats, researchers say.

...more

Billy Corgan Paid Off Hacker Who Threatened to Leak New Smashing Pumpkins Songs

Published: 2023-05-11 19:00:00

Popularity: 37

Author: Dark Reading Staff, Dark Reading

Corgan got FBI involved to track down the cybercriminal, who had stolen from other artists as well, he said.

...more

Rebinding Attacks Persist With Spotty Browser Defenses

Published: 2023-05-17 18:21:29

Popularity: None

Author: Robert Lemos, Contributing Writer, Dark Reading

DNS rebinding attacks are not often seen in the wild, which is one reason why browser makers have taken a slower approach to adopting the web security standard.

...more

Once Again, Malware Discovered Hidden in npm

Published: 2023-05-18 15:27:00

Popularity: 15

Author: Nathan Eddy, Contributing Writer, Dark Reading

Turkorat-poisoned packages sat in the npm development library for months, researchers say.

...more

Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations

Published: 2023-05-22 19:29:00

Popularity: 32

Author: Dark Reading Staff, Dark Reading

The technology conglomerate has until later this year to end its transfer of European user's data across the Atlantic.

...more

PyPI Shuts Down Over the Weekend, Says Incident Was Overblown

Published: 2023-05-22 20:52:00

Popularity: 45

Author: Nate Nelson, Contributing Writer, Dark Reading

The climate of concern around open source security and supply chain attacks may have caused a small story to become a big one.

...more

Red Hat Tackles Software Supply Chain Security

Published: 2023-05-25 21:50:00

Popularity: 93

Author: Jeffrey Schwartz, Contributing Writer, Dark Reading

The new Red Hat Trusted Software Supply Chain services help developers take a secure-by-design approach to build, deploy, and monitor software.

...more

Tesla Whistleblower Leaks 100GB of Data, Revealing Safety Complaints

Published: 2023-05-26 17:32:00

Popularity: 28

Author: Dark Reading Staff, Dark Reading

Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.

...more

Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews

Published: 2023-05-31 01:25:00

Popularity: 12

Author: Ericka Chickowski, Contributing Writer, Dark Reading

As the second Kaminsky Fellow, Andrews will study the use of threat intelligence to track campaigns against the human rights community.

...more

Yet Another Toyota Cloud Data Breach Jeopardizes Thousands of Customers

Published: 2023-05-31 21:08:00

Popularity: 192

Author: Dark Reading Staff, Dark Reading

The newly found misconfigured cloud services are discovered just two weeks after an initial data breach affecting millions came to light.

...more

Human-Assisted CAPTCHA-Cracking Services Supercharge Shopper Bots

Published: 2023-05-30 21:39:00

Popularity: 48

Author: Dark Reading Staff, Dark Reading

On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.

...more

Google Debuts Quality Ratings for Security Bug Disclosures

Published: 2023-05-19 13:05:00

Popularity: 34

Author: Becky Bracken, Editor, Dark Reading

New rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.

...more

Twitter 'Shadow Ban' Bug Gets Official CVE

Published: 2023-04-06 19:20:29

Popularity: 94

Author: Dark Reading Staff, Dark Reading

A flaw in Twitter code allows bot abuse to trick the algorithm into suppressing certain accounts.

...more

Microsoft Patches 'Dangerous' RCE Flaw in Azure Cloud Service

Published: 2023-03-30 18:58:13

Popularity: 50

Author: Elizabeth Montalbano, Contributor, Dark Reading

The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform's nodes.

...more

GitHub's Private RSA SSH Key Mistakenly Exposed in Public Repository

Published: 2023-03-24 20:05:00

Popularity: 106

Author: Dark Reading Staff, Dark Reading

GitHub hastens to replace its RSA SSH host key after an exposure mishap threatens users with man-in-the-middle attacks and organization impersonation.

...more

NIST's Quantum-Proof Algorithm Has a Bug, Analysts Say

Published: 2023-03-08 17:36:54

Popularity: None

Author: Dark Reading

A team has found that the Crystals-Kyber encryption algorithm is open to side-channel attacks, under certain implementations.

...more

Booking.com's OAuth Implementation Allows Full Account Takeover

Published: 2023-03-02 16:16:00

Popularity: 15

Author: Elizabeth Montalbano, Contributor, Dark Reading

Researchers exploited issues in the authentication protocol to force an open redirection from the popular hotel reservations site when users used Facebook to log in to accounts.

...more

Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist

Published: 2023-02-28 17:43:44

Popularity: 19

Author: Robert Lemos, Contributing Writer, Dark Reading

The opportunistic "SCARLETEEL" attack on a firm's Amazon Web Services account turns into targeted data theft after the intruder uses an overpermissioned service to jump into cloud system.

...more

Facebook Bug Allows 2FA Bypass Via Instagram

Published: 2023-01-30 19:00:00

Popularity: 67

Author: Dark Reading Staff, Dark Reading

The Instagram rate-limiting bug, found by a rookie hunter, could be exploited to bypass Facebook 2FA in vulnerable apps, researcher reports.

...more

Despite Breach, LastPass Demonstrates the Power of Password Management

Published: 2023-02-20 14:01:00

Popularity: 35

Author: Michael Bargury, CTO & Co-Founder, Zenity

What's scarier than keeping all of your passwords in one place and having that place raided by hackers? Maybe reusing insecure passwords.

...more

87% of Container Images in Production Have Critical or High-Severity Vulnerabilities

Published: 2023-02-24 00:03:00

Popularity: 53

Author: Jeffrey Schwartz, Contributing Writer, Dark Reading

At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.

...more

Google Fi Users Caught Up in T-Mobile Breach

Published: 2023-02-01 14:18:08

Popularity: 24

Author: Dark Reading Staff, Dark Reading

Google Fi mobile customers have been alerted that their SIM card serial numbers, phone numbers, and other data were exposed in T-Mobile hack.

...more

Jailbreak Trick Breaks ChatGPT Content Safeguards

Published: 2023-02-08 22:05:00

Popularity: 66

Author: Dark Reading Staff, Dark Reading

Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls.

...more

GoTo Encrypted Backups Stolen in LastPass Breach

Published: 2023-01-26 02:45:40

Popularity: None

Author: Dark Reading

Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.

...more

Hunting Insider Threats on the Dark Web

Published: 2023-01-23 15:00:00

Popularity: 143

Author: Jim Simpson, Director of Threat Intelligence, Searchlight Cyber

Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.

...more

JsonWebToken Security Bug Opens Servers to RCE

Published: 2023-01-09 17:45:00

Popularity: 147

Author: Nathan Eddy, Contributing Writer, Dark Reading

The JsonWebToken package plays a big role in the authentication and authorization functionality for many applications.

...more

Google WordPress Plug-in Bug Allows AWS Metadata Theft

Published: 2022-12-22 15:00:01

Popularity: 17

Author: Nathan Eddy, Contributing Writer, Dark Reading

A successful attacker could use the SSRF vulnerability to collect metadata from WordPress sites hosted on an AWS server, and potentially log in to a cloud instance to run commands.

...more

Container Verification Bug Allows Malicious Images to Cloud Up Kubernetes

Published: 2022-12-23 18:18:27

Popularity: 29

Author: Tara Seals, Managing Editor, News, Dark Reading

A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes pod to steal data and inject malware.

...more

Report: Air-Gapped Networks Vulnerable to DNS Attacks

Published: 2022-12-08 14:12:04

Popularity: 119

Author: Elizabeth Montalbano, Contributor, Dark Reading

Common mistakes in network configuration can jeopardize the security of highly protected assets and allow attackers to steal critical data from the enterprise.

...more

Killnet Gloats About DDoS Attacks Downing Starlink, White House

Published: 2022-11-29 18:15:00

Popularity: 40

Author: Becky Bracken, Editor, Dark Reading

Elon Musk-owned Starlink, WhiteHouse.gov, and the Prince of Wales were targeted by Killnet in apparent retaliation for its support of Ukraine.

...more

$275M Fine for Meta After Facebook Data Scrape

Published: 2022-11-28 18:11:09

Popularity: 59

Author: Dark Reading Staff, Dark Reading

Meta has been found in violation of Europe's GDPR rules requiring the social media giant to protect user data by "design and default."

...more

Intel Processor UEFI Source Code Leaked

Published: 2022-10-11 17:49:46

Popularity: 66

Author: Dark Reading Staff, Dark Reading

Exposed code included private key for Intel Boot Guard, meaning it can no longer be trusted, according to a researcher.

...more

Critical Open Source vm2 Sandbox Escape Bug Affects Millions

Published: 2022-10-11 14:23:07

Popularity: 56

Author: Elizabeth Montalbano, Contributor, Dark Reading

Attackers could exploit the "Sandbreak" security bug, which has earned a 10 out of 10 on the CVSS scale, to execute a sandbox escape, achieve RCE, and run shell commands on a hosting machine.

...more

Android Leaks Wi-Fi Traffic Even When VPN Protection Features Are On

Published: 2022-10-12 16:20:35

Popularity: 14

Author: Elizabeth Montalbano, Contributor, Dark Reading

The platform lets network connectivity data escape outside of the secure tunnel when connected to a public network, posing a "privacy concern" for users with "certain threat models," researchers said.

...more

Signal to Ditch SMS/MMS Messaging on Android

Published: 2022-10-17 17:54:37

Popularity: 18

Author: Dark Reading Staff, Dark Reading

Main driver for the change: "Plaintext SMS messages are inherently insecure."

...more

Ikea Smart Light System Flaw Lets Attackers Turn Bulbs on Full Blast

Published: 2022-10-05 20:00:00

Popularity: 59

Author: Dark Reading Staff, Dark Reading

With just one malformed Zigbee frame, attackers could take over certain Ikea smart lightbulbs, leaving users unable to turn the lights down.

...more

Key Takeaways From the Twitter Whistleblower's Testimony

Published: 2022-09-14 00:59:31

Popularity: 15

Author: Edge Editors, Dark Reading

Twitter did not know what data it had or who had access to it, Peiter "Mudge" Zatko told Congressional lawmakers during a Senate panel hearing.

...more

Malicious Apps With Millions of Downloads Found in Apple App Store, Google Play

Published: 2022-09-23 20:04:00

Popularity: 181

Author: Becky Bracken, Editor, Dark Reading

The ongoing ad fraud campaign can be traced back to 2019, but recently expanded into the iOS ecosystem, researchers say.

...more

Spell-Checking in Google Chrome, Microsoft Edge Browsers Leaks Passwords

Published: 2022-09-20 17:37:16

Popularity: 131

Author: Elizabeth Montalbano, Contributor, Dark Reading

It's called "spell-jacking": Both browsers have spell-check features that send data to Microsoft and Google when users fill out forms for websites or Web services.

...more

Whack-a-Mole: More Malicious PyPI Packages Spring Up Targeting Discord, Roblox

Published: 2022-08-16 18:51:56

Popularity: 19

Author: Dark Reading Staff, Dark Reading

Just as one crop of malware-laced software packages is taken down from the popular Python code repository, a new host arrives, looking to steal a raft of data.

...more

Phishing Campaign Targets PyPI Users to Distribute Malicious Code

Published: 2022-08-30 14:16:23

Popularity: 35

Author: Elizabeth Montalbano, Contributor, Dark Reading

The first-of-its-kind campaign threatens to remove code packages if developers don’t submit their code to a "validation" process.

...more

Malicious Chrome Extensions Plague 1.4M Users

Published: 2022-08-30 20:00:00

Popularity: 19

Author: Dark Reading Staff, Dark Reading

Analysts find five cookie-stuffing extensions, including one that's Netflix-themed, that track victim browsing and insert rogue IDs into e-commerce sites to rack up fake affiliate payments.

...more

Multiple Windows, Adobe Zero-Days Anchor Knotweed Commercial Spyware

Published: 2022-07-27 18:49:47

Popularity: 950

Author: Tara Seals, Managing Editor, News, Dark Reading

Microsoft flagged the company's Subzero tool set as on offer to unscrupulous governments and shady business interests.

...more

WordPress Page Builder Plug-in Under Attack, Can't Be Patched

Published: 2022-07-18 17:55:01

Popularity: 29

Author: Dark Reading Staff, Dark Reading

An ongoing campaign is actively targeting the vulnerability in the Kaswara Modern WPBakery Page Builder Addon, which is still installed on up to 8,000 sites, security analysts warn.

...more

PyPI Mandates 2FA, Plans Google Titan Key Giveaway

Published: 2022-07-12 22:42:37

Popularity: 23

Author: Dark Reading Staff, Dark Reading

Python's most popular package manager is intent on securing the supply chain by requiring developers to enable two-factor authentication.

...more

OpenSea NFT Marketplace Faces Insider Hack

Published: 2022-07-01 19:09:27

Popularity: 13817

Author: Becky Bracken, Editor, Dark Reading

OpenSea warns users that they are likely to be targeted in phishing attacks after a vendor employee accessed and downloaded its email list.

...more

Capital One Attacker Exploited Misconfigured AWS Databases

Published: 2022-06-20 21:25:39

Popularity: 25

Author: Tara Seals, Managing Editor, News, Dark Reading

After bragging in underground forums, the woman who stole 100 million credit applications from Capital One has been found guilty.

...more

WordPress Plug-in Ninja Forms Issues Update for Critical Bug

Published: 2022-06-17 18:53:38

Popularity: 4200

Author: Dark Reading Staff, Dark Reading

The code injection vulnerability is being actively exploited in the wild, researchers say.

...more

Exposed Travis CI API Leaves All Free-Tier Users Open to Attack

Published: 2022-06-13 19:43:16

Popularity: 9178

Author: Dark Reading Staff, Dark Reading

Public Travis CI logs loaded with GitHub, AWS, Docker Hub account tokens, and other sensitive data could be leveraged for lateral cloud attacks.

...more

Zero-Click Zoom Bug Allows Code Execution Just by Sending a Message

Published: 2022-05-25 19:21:04

Popularity: 36

Author: Tara Seals, Managing Editor, News, Dark Reading

Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.

...more

SolarWinds Attackers Gear Up for Typosquatting Attacks

Published: 2022-05-03 20:35:19

Popularity: 451

Author: Dark Reading Staff, Dark Reading

The same infrastructure traced back to Russian-speaking threat group Nobelium is being used to set up misspelled domain names, presaging impersonation attacks bent on credential harvesting, analysts say.

...more

Heroku: Cyberattacker Used Stolen OAuth Tokens to Steal Customer Account Credentials

Published: 2022-05-05 21:21:52

Popularity: 29

Author: Jai Vijayan, Contributing Writer

The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says.

...more

Details Released on SonicWall Flaws in SMA-100 Devices

Published: 2022-01-11 19:05:00

Popularity: 20

Author: Dark Reading Staff, Dark Reading

The most serious of the five vulnerabilities disclosed today can lead to unauthenticated remote code execution on affected devices.

...more

New Firefox Sandbox Isolates Third-Party Libraries

Published: 2021-12-10 12:38:27

Popularity: 24

Author: Fahmida Y. Rashid, Features Editor, Dark Reading

RLBox can be used to protect web browsers and other software applications from vulnerabilities in subcomponents and libraries.

...more

Researcher Details Vulnerabilities Found in AWS API Gateway

Published: 2021-11-10 14:30:00

Popularity: 34

Author: Kelly Jackson Higgins, Executive Editor

AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.

...more

MacOS Zero-Day Used in Watering-Hole Attacks

Published: 2021-11-15 22:23:23

Popularity: 27

Author: Robert Lemos, Contributing Writer

Attackers targeted Chinese pro-democracy groups using a vulnerability fixed in September along with a second vulnerability fixed early in the year, Google says.

...more

Why Should I Care About HTTP Request Smuggling?

Published: 2021-09-29 15:26:23

Popularity: 17

Author: Asaf Karas, CTO. JFrog Security

HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration.

...more

NSO Group Spyware Used On Journalists & Activists Worldwide

Published: 2021-07-19 18:53:00

Popularity: 28

Author: Dark Reading Staff

An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world.

...more

Sophos Acquires Capsule8 for Linux Server & Container Security

Published: 2021-07-07 18:54:00

Popularity: 16

Author: Dark Reading Staff

The deal was announced the same day ZeroFox bought Dark Web intelligence firm Vigilante as a wave of security M&A continues.

...more

Researchers Learn From Nation-State Attackers' OpSec Mistakes

Published: 2021-07-06 21:42:00

Popularity: 19

Author: Kelly Sheridan Staff Editor, Dark Reading

NSA Funds Development & Release of D3FEND Framework

Published: 2021-06-22 17:26:00

Popularity: 18

Author: Dark Reading Staff

The framework, now available through MITRE, provides countermeasures to attacks.

...more

High-Level FIN7 Member Sentenced to 7 Years in Prison

Published: 2021-06-25 15:00:00

Popularity: 27

Author: Dark Reading Staff

Andrii Kolpakov, who served as a high-level pentester for the criminal group, was also ordered to pay $2.5 million in restitution.

...more

Google Launches SLSA, a New Framework for Supply Chain Integrity

Published: 2021-06-17 20:50:00

Popularity: 5

Author: Dark Reading Staff

The "Supply chain Levels for Software Artifacts" aims to ensure the integrity of components throughout the software supply chain.

...more

Critical Zero-Day Discovered in Fancy Product Designer WordPress Plug-in

Published: 2021-06-02 17:42:00

Popularity: 20

Author: Dark Reading Staff

The plug-in under active attack has been installed on more than 17,000 websites, say researchers.

...more

Russian Sentenced to 30 Months for Running Criminal Website

Published: 2021-05-25 18:32:00

Popularity: 21

Author: Dark Reading Staff

FBI says sales from illicit online shop deer.io exceeded $17 million

...more

Google Discovers New Rowhammer Attack Technique

Published: 2021-05-26 20:32:00

Popularity: 424

Author: Dark Reading Staff

Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.

...more

Adobe Issues Patch for Acrobat Zero-Day

Published: 2021-05-11 21:02:00

Popularity: 3023

Author: Dark Reading Staff

The vulnerability is being exploited in limited attacks against Adobe Reader users on Windows.

...more

Apple Issues Patches for Webkit Security Flaws

Published: 2021-05-04 21:21:00

Popularity: 34

Author: Dark Reading Staff

API Hole on Experian Partner Site Exposes Credit Scores

Published: 2021-04-29 19:49:00

Popularity: 78

Author: Dark Reading Staff

Student researcher is concerned security gap may exist on many other sites.

...more

Nissan Source Code Leaked via Misconfigured Git Server

Published: 2021-01-06 22:00:00

Popularity: 583

Author: Dark Reading Staff

Leaked information includes source code of Nissan mobile apps, diagnostics tool, and market research tools and data, among other assets.

...more

T-Mobile Hacked -- Again

Published: 2021-01-04 19:10:00

Popularity: 151

Author: Dark Reading Staff

The wireless carrier has suffered a data breach for the fourth time since 2018.

...more

The Coolest Hacks of 2020

Published: 2020-12-31 13:30:00

Popularity: 93

Author: Kelly Jackson Higgins Executive Editor at Dark Reading

Despite a pandemic and possibly the worst cyberattack campaign ever waged against the US, the year still had some bright spots when it came to "good" and creative hacks.

...more

Flash Dies but Warning Signs Persist: A Eulogy for Tech's Terrible Security Precedent

Published: 2020-12-04 15:00:00

Popularity: 68

Author: Rotem Iram Founder & CEO, At-Bay

Flash will be gone by the end of the year, but the ecosystem that allowed it to become a software security serial killer is ready to let it happen again.

...more

Law Enforcement Disrupts VPN Services Enabling Cybercrime

Published: 2020-12-22 16:35:00

Popularity: 83

Author: Dark Reading Staff

The United States and international partners shut down three bulletproof hosting services used to facilitate criminal activity.

...more

Cisco, Intel, Deloitte Among Victims of SolarWinds Breach: Report

Published: 2020-12-21 22:25:00

Popularity: 135

Author: Dark Reading Staff

The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code.

...more

Collection of Metadata -- as Done by the NSA -- Likely Unconstitutional, US Court Suggests

Published: 2020-09-04 17:20:00

Popularity: 85

Author: Robert Lemos Contributing Writer

A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional.

...more

WordPress Plug-in Has Critical Zero-Day

Published: 2020-09-08 19:00:00

Popularity: 95

Author: Dark Reading Staff

The vulnerability in WordPress File Manager could allow a malicious actor to take over the victim's website.

...more

REvil Ransomware Hits Jack Daniel's Manufacturer

Published: 2020-08-17 18:00:00

Popularity: 268

Author: Dark Reading Staff

Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.

...more

70,000+ WordPress Sites Affected by Critical Plug-in Flaw

Published: 2020-07-29 19:10:00

Popularity: 110

Author: Dark Reading Staff

A vulnerability in the wpDiscuz plug-in could let attackers remotely execute code on the servers of affected websites.

...more

CouchSurfing Investigates Potential Data Breach

Published: 2020-07-23 17:15:00

Popularity: 23

Author: Dark Reading Staff

The service has reportedly hired a security firm after 17 million user records were found on a public hacking forum.

...more

Adobe Releases PDF Protected Mode for Acrobat DC

Published: 2020-06-16 20:45:00

Popularity: 12

Author: Dark Reading Staff

The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.

...more

Zoom Changes Course on End-to-End Encryption

Published: 2020-06-17 21:40:00

Popularity: 101

Author: Dark Reading Staff

The videoconferencing company now says it will offer end-to-end encryption to all users beginning in July.

...more

Adobe Releases PDF Protected Mode for Document Cloud

Published: 2020-06-16 20:45:00

Popularity: 69

Author: Dark Reading Staff

The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.

...more

Fake COVID-19 Contact-Tracing Apps Infect Android Phones

Published: 2020-06-10 17:45:00

Popularity: 183

Author: Dark Reading Staff

Researchers find 12 Android applications disguised as official COVID-19 contact tracing apps installing malware onto devices.

...more

Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them

Published: 2020-06-01 17:35:00

Popularity: 189

Author: Robert Lemos Contributing Writer

The Sandworm group -- behind disinformation and election-hacking campaigns and responsible for a 2016 power outage in the Ukraine -- is now targeting e-mail servers.

...more

NSA Warns Russia's 'Sandworm' Group Is Targeting Email Servers

Published: 2020-05-28 18:15:00

Popularity: 114

Author: Dark Reading Staff

The Russian military group has been exploiting a flaw in the Exim mail transfer agent since last August, the NSA reports.

...more

Zoom Acquires Keybase, Plans for End-to-End Encrypted Chats

Published: 2020-05-07 16:15:00

Popularity: 73

Author: Dark Reading Staff

The company's first acquisition to date is part of a 90-day plan to improve security in its video communications platform.

...more

Researchers Find Vulnerabilities in Popular Remote Learning Plug-ins

Published: 2020-04-30 16:00:00

Popularity: 94

Author: Robert Lemos Contributing Writer

As more students move to online learning platforms, vulnerability researchers are revealing security flaws in some common software plug-ins.

...more

Health Prognosis on the Security of IoMT Devices? Not Good

Published: 2020-04-25 13:30:00

Popularity: 142

Author: Nicole Ferraro Freelance Writer

As more so-called Internet of Medical Things devices go online, hospitals and medical facilities face significant challenges in securing them from attacks that could endanger patients' lives.

...more

Mozilla Patches Two Critical Zero-Days in Firefox

Published: 2020-04-06 15:45:00

Popularity: 103

Author: Dark Reading Staff

The latest release of Firefox brings fixes for two Critical vulnerabilities already seen exploited in the wild.

...more

Proof of Concept Released for kr00k Wi-Fi Vulnerability

Published: 2020-03-20 16:45:00

Popularity: 90

Author: Dark Reading Staff

The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices.

...more

Google Adds More Security Features Via Chronicle Division

Published: 2020-02-25 18:30:00

Popularity: 48

Author: Robert Lemos Contributing Writer

Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform.

...more

Kr00k Wi-Fi Vulnerability Affected a Billion Devices

Published: 2020-02-26 15:15:00

Popularity: 276

Author: Robert Lemos Contributing Writer

Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.

...more

Tesla, SpaceX Parts Manufacturer Suffers Data Breach

Published: 2020-03-02 17:45:00

Popularity: 265

Author: Dark Reading Staff

Visser Precision has confirmed a security incident likely caused by the data-stealing DoppelPaymer ransomware.

...more

Clearview AI Customers Exposed in Data Breach

Published: 2020-02-28 01:00:00

Popularity: 170

Author: Dark Reading Staff

Customers for the controversial facial recognition company were detailed in a log file leaked to news organizations.

...more

Kubernetes Shows Built-in Weakness

Published: 2020-02-04 15:45:00

Popularity: 75

Author: Curtis Franklin Jr. Senior Editor at Dark Reading

LLM Says: ""Security hole""

A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.

...more

United Nations Data Breach Started with Microsoft SharePoint Bug

Published: 2020-01-30 18:10:00

Popularity: 138

Author: Dark Reading Staff

A remote code execution flaw enabled a breach of UN offices in Geneva and Vienna, as well as the Office of the High Commissioner for Human Rights.

...more

NFL, Multiple NFL Teams' Twitter Accounts Hacked and Hijacked

Published: 2020-01-29 00:30:00

Popularity: 134

Author: Dark Reading Staff

Hackers claiming to be from the hacktivist group OurMine temporarily took over Twitter accounts of the NFL and several teams in the league.

...more

'CardPlanet' Operator Pleads Guilty in Federal Court

Published: 2020-01-24 21:30:00

Popularity: 128

Author: Dark Reading Staff

Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.

...more

Malicious Google Play Apps Linked to SideWinder APT

Published: 2020-01-06 22:20:00

Popularity: 134

Author: Kelly Sheridan Staff Editor, Dark Reading

The active attack involving three malicious Android applications is the first exploiting CVE-2019-2215, Trend Micro researchers report.

...more

Las Vegas Suffers Cyberattack on First Day of CES

Published: 2020-01-09 01:45:00

Popularity: 205

Author: Dark Reading Staff

The attack, still under investigation, hit early in the morning of Jan. 7.

...more

Siemens Contractor Sentenced for Writing 'Logic Bombs'

Published: 2019-12-17 16:40:00

Popularity: 92

Author: Dark Reading Staff

David Tinley, 62, rigged software he wrote for the company starting in 2014 and into 2016, causing the programs to fail.

...more

Data Leak Week: Billions of Sensitive Files Exposed Online

Published: 2019-12-10 23:30:00

Popularity: 156

Author: Kelly Jackson Higgins Executive Editor at Dark Reading

A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets.

...more

Blink Cameras Found with Multiple Vulnerabilities

Published: 2019-12-10 20:50:00

Popularity: 70

Author: Dark Reading Staff

Researchers found three broad types of vulnerabilities, one of which should be particularly concerning to consumers.

...more

Microsoft Fixes Windows Zero-Day on Lightest Patch Tuesday of 2019

Published: 2019-12-10 21:30:00

Popularity: 74

Author: Kelly Sheridan Staff Editor, Dark Reading

This month's batch of security updates addresses 36 CVEs, seven of which are rated Critical and one of which has been exploited in the wild.

...more

Attackers Continue to Exploit Outlook Home Page Flaw

Published: 2019-12-04 15:45:00

Popularity: 53

Author: Robert Lemos Contributing Writer

Cisco Webex & Zoom Bug Lets Attackers Spy on Conference Calls

Published: 2019-10-01 21:10:00

Popularity: 158

Author: Kelly Sheridan Staff Editor, Dark Reading

The "Prying-Eye" vulnerability could let intruders scan for unprotected meeting IDs and snoop on conference calls.

...more

NSA Issues Advisory on VPN Vulnerability Trio

Published: 2019-10-08 20:55:00

Popularity: 219

Author: Dark Reading Staff

Vulnerabilities with Pulse Secure, Fortinet, and Palo Alto Networks VPNs are called out in the advisory.

...more

218M Words with Friends Players Compromised in Data Breach

Published: 2019-09-30 15:00:00

Popularity: 285

Author: Dark Reading Staff

The same attacker was reportedly behind the Collection #1 and Collection #2 data dumps earlier this year.

...more

DoorDash Breach Affects 4.9M Merchants, Customers, Workers

Published: 2019-09-27 14:30:00

Popularity: 145

Author: Dark Reading Staff

The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.

...more

Data Leak Affects Most of Ecuador's Population

Published: 2019-09-16 17:40:00

Popularity: 69

Author: Kelly Sheridan Staff Editor, Dark Reading

An unsecured database containing 18GB of data exposed more than 20 million records, most of which held details about Ecuadorian citizens.

...more

Court Rules In Favor of Firm 'Scraping' Public Data

Published: 2019-09-16 18:00:00

Popularity: 76

Author: Dark Reading Staff

US appeals court said a company can legally use publicly available LinkedIn account information.

...more

VMware to Buy Carbon Black for $2.1B

Published: 2019-08-23 15:30:00

Popularity: 70

Author: Dark Reading Staff

Virtual machine giant's big cloud move includes plans to shell out $2.7 billion in stock transactions for Pivotal Software.

...more

Imperva Customer Database Exposed

Published: 2019-08-27 21:00:00

Popularity: 110

Author: Dark Reading Staff

A subset of customers for the company's Incapsula web application firewall had their email addresses, hashed/salted passwords, and more open to unauthorized access, Imperva announced.

...more

Security Flaws Discovered in 40 Microsoft-Certified Device Drivers

Published: 2019-08-12 21:30:00

Popularity: 131

Author: Curtis Franklin Jr. Senior Editor at Dark Reading

LLM Says: ""Driver fail""

Attackers can use vulnerable drivers to escalate privilege and execute malicious code in every part of the system.

...more

700K Guest Records Stolen in Choice Hotels Breach

Published: 2019-08-13 16:20:00

Popularity: 163

Author: Dark Reading Staff

Cybercriminals reportedly stole the information from an exposed MongoDB database on a third-party server.

...more

BioStar 2 Leak Exposes 23GB Data, 1M Fingerprints

Published: 2019-08-14 15:30:00

Popularity: 177

Author: Dark Reading Staff

Thousands of organizations, including banks, governments, and the UK Metropolitan Police, use the biometric security tool to authenticate users.

...more

Malware Researcher Hutchins Sentenced to Supervised Release

Published: 2019-07-26 19:10:00

Popularity: 141

Author: Dark Reading Staff

Marcus Hutchins, the researcher known for stopping WannaCry, avoids jail time over charges of creating and distributing Kronos malware.

...more

Malware in PyPI Code Shows Supply Chain Risks

Published: 2019-07-19 17:30:00

Popularity: 164

Author: Curtis Franklin Jr. Senior Editor at Dark Reading

LLM Says: ""Python Pandemonium""

A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.

...more

Lenovo NAS Firmware Flaw Exposes Stored Data

Published: 2019-07-16 21:20:00

Popularity: 192

Author: Jai Vijayan Contributing Writer

More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.

...more

Vulnerability Found in GE Anesthesia Machines

Published: 2019-07-10 17:30:00

Popularity: 92

Author: Dark Reading Staff

GE Healthcare has released a statement claiming the bug is not in the machine itself and does not pose direct risk to patients.

...more

D-Link Agrees to Strengthen Device Security

Published: 2019-07-04 03:30:00

Popularity: 186

Author: Dark Reading Staff

A settlement with the FTC should mean comprehensive security upgrades for D-Link routers and IP camera.

...more

How Hackers Infiltrate Open Source Projects

Published: 2019-06-27 18:45:00

Popularity: 183

Author: Curtis Franklin Jr. Senior Editor at Dark Reading

The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code.

...more

Chronicle Folds into Google

Published: 2019-06-27 22:30:00

Popularity: 73

Author: Curtis Franklin Jr. Senior Editor at Dark Reading

LLM Says: ""Newspaper disappears""

Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.

...more

Cloud Provider PCM Suffers Data Breach

Published: 2019-06-28 15:40:00

Popularity: 218

Author: Dark Reading Staff

Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.

...more

Patch Now: Another Google Zero-Day Under Exploit in the Wild

Published: 2024-05-16 12:48:06

Popularity: 15

Author: Dark Reading Staff

Google has rolled an emergency patch for CVE-2024-4947, the third Chrome zero-day it's addressed in the past week.

...more

SEC Adds New Incident Response Rules for Financial Sector

Published: 2024-05-17 18:03:51

Popularity: 8

Author: Dark Reading Staff

Financial firms covered under new regulations will be required to establish a clear response and communications plan for customer data breaches.

...more

Microsoft Has Yet to Patch 7 Pwn2Own Zero-Days

Published: 2024-05-17 12:00:00

Popularity: 63

Author: Nate Nelson, Contributing Writer

A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever — and time is running short before ZDI releases exploit details.

...more

D-Link Routers Vulnerable to Takeover Via Exploit for Zero-Day

Published: 2024-05-15 15:42:28

Popularity: 10

Author: Elizabeth Montalbano, Contributing Writer

A vulnerability in the HNAP login request protocol that affects a family of devices gives unauthenticated users root access for command execution.

...more

Microsoft Will Hold Executives Accountable for Cybersecurity

Published: 2024-05-08 13:00:00

Popularity: 54

Author: Jai Vijayan, Contributing Writer

At least a portion of executive compensation going forward will be tied to meeting security goals and metrics.

...more

Is CISA's Secure by Design Pledge Toothless?

Published: 2024-05-10 18:21:29

Popularity: 9

Author: Nate Nelson, Contributing Writer

CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.

...more

Russia's Fancy Bear Pummels Windows Print Spooler Bug

Published: 2024-04-23 13:21:39

Popularity: 14

Author: Elizabeth Montalbano, Contributing Writer

The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE-2022-38028 in cyber-espionage attacks against targets in Ukraine, Western Europe, and North America.

...more

Cisco Zero-Days Anchor 'ArcaneDoor' Cyber-Espionage Campaign

Published: 2024-04-25 15:59:45

Popularity: 6

Author: Elizabeth Montalbano, Contributing Writer

Attacks by a previously unknown threat actor leveraged two bugs in firewall devices to install custom backdoors on several government networks globally.

...more

Critical Bug Allows DoS, RCE, Data Leaks in All Major Cloud Platforms

Published: 2024-05-20 19:31:25

Popularity: 95

Author: Nate Nelson, Contributing Writer

An on-by-default endpoint in ubiquitous logging service Fluent Bit contains an oversight that hackers can toy with to rattle most any cloud environment.

...more

Okta Warns Once Again of Credential-Stuffing Attacks

Published: 2024-05-30 15:43:41

Popularity: 6

Author: Elizabeth Montalbano, Contributing Writer

LLM Says: "password fail"

This time it's the identity management service provider's cross-origin authentication feature that's being targeted by adversaries.

...more

Students Spot Washing Machine App Flaw That Gives Out Free Cycles

Published: 2024-05-20 19:03:41

Popularity: 28

Author: Kristina Beek, Associate Editor, Dark Reading

LLM Says: "Spin Cycle"

UCSC students say that after reporting the bug months ago, they're still able to rack up unlimited free wash loads at their local laundromat.

...more

Google Opens $250K Bug Bounty Contest for VM Hypervisor

Published: 2024-07-01 20:35:22

Popularity: 12

Author: Dark Reading Staff

LLM Says: "Bug Bounty Party"

If security researchers can execute a guest-to-host attack using a zero-day vulnerability in the KVM open source hypervisor, Google will make it worth their while.

...more

Snowflake Account Attacks Driven by Exposed Legitimate Credentials

Published: 2024-07-17 14:00:00

Popularity: 18

Author: Stephanie Schneider

LLM Says: "passwords gone wild"

Credential management gets a boost with the latest infostealers' extortion campaign built on info stolen from cloud storage systems.

...more

20 Million Trusted Domains Vulnerable to Email Hosting Exploits

Published: 2024-07-18 17:53:43

Popularity: 21

Author: Elizabeth Montalbano, Contributing Writer

LLM Says: "Email fail"

Three newly discovered SMTP smuggling attack techniques can exploit misconfigurations and design decisions made by at least 50 email-hosting providers.

...more

US Data Breach Victim Numbers Increase by 1,000%, Literally

Published: 2024-07-18 21:04:59

Popularity: 14

Author: Dark Reading Staff

LLM Says: ""Data Alert!""

Though the number of victims has risen, the actual number of breaches has gone down, as fewer, bigger breaches affect more individuals.

...more

Sizable Chunk of SEC Charges Against SolarWinds Tossed Out of Court

Published: 2024-07-18 21:43:20

Popularity: 7

Author: Becky Bracken, Senior Editor, Dark Reading

LLM Says: ""Solar Flare Up""

Judge dismisses claims against SolarWinds for actions taken after its systems had been breached, but allows the case to proceed for alleged misstatements prior to the incident.

...more

Swipe Right for Data Leaks: Dating Apps Expose Location, More

Published: 2024-07-22 18:18:55

Popularity: 145

Author: Elizabeth Montalbano, Contributing Writer

LLM Says: "Data leak alert"

Apps like Tinder, Bumble, Grindr, Badoo, OKCupid, MeetMe, and Hinge all have API vulnerabilities that expose sensitive user data, and six allow a threat actor to pinpoint exactly where someone is.

...more

Cloud Security Alliance Introduces Certificate of Cloud Security Knowledge

Published: 2024-07-22 20:29:12

Popularity: 6

Author: None

LLM Says: "Cloudy with a chance of breach"

Wanted: An SBOM Standard to Rule Them All

Published: 2024-07-23 14:00:00

Popularity: 8

Author: Eric Braun

LLM Says: "Software security chaos"

A unified standard is essential for realizing the full potential of SBOMs in enhancing software supply chain security.

...more

Attackers Exploit 'EvilVideo' Telegram Zero-Day to Hide Malware

Published: 2024-07-23 16:21:16

Popularity: 7

Author: Elizabeth Montalbano, Contributing Writer

LLM Says: "Sneaky malware"

An exploit sold on an underground forum requires user action to download an unspecified malicious payload.

...more

Goodbye? Attackers Can Bypass 'Windows Hello' Strong Authentication

Published: 2024-07-23 19:16:12

Popularity: 41

Author: Jeffrey Schwartz, Contributing Writer

LLM Says: "windows hello fail"

Accenture researcher undercut WHfB's default authentication using open source Evilginx adversary-in-the-middle (AitM) reverse-proxy attack framework.

...more

CrowdStrike Outage Losses Estimated at a Staggering $5.4B

Published: 2024-07-26 20:36:57

Popularity: 7

Author: Dark Reading Staff

LLM Says: "System down 💻"

Researchers track the healthcare sector as experiencing the biggest financial losses, with banking and transportation following close behind.

...more

Security Firm Accidentally Hires North Korean Hacker, Did Not KnowBe4

Published: 2024-07-25 15:32:05

Popularity: 22

Author: Elizabeth Montalbano, Contributing Writer

LLM Says: "oops, hired wrong guy"

A software engineer hired for an internal IT AI team immediately became an insider threat by loading malware onto his workstation.

...more

CrowdStrike 'Updates' Deliver Malware & More as Attacks Snowball

Published: 2024-07-25 20:51:01

Popularity: 43

Author: Nate Nelson, Contributing Writer

LLM Says: "Malware Alert"

The fake updates are part of a phishing and fraud surge that is both more voluminous and more targeted that the usual activity around national news stories.

...more

Critical, Actively Exploited Jenkins RCE Bug Suffers Patch Lag

Published: 2024-08-22 19:42:04

Popularity: None

Author: Nate Nelson, Contributing Writer

LLM Says: ""Exploit alert""

A 7-month-old bug in an OSS CI/CD server is still being actively exploited, thanks to spotty patching, CISA warns.

...more

GitHub Attack Vector Cracks Open Google, Microsoft, AWS Projects

Published: 2024-08-14 14:16:57

Popularity: 22

Author: Elizabeth Montalbano, Contributing Writer

LLM Says: ""Ouch, they're vulnerable""

Cloud services and thus millions of end users who access them could have been affected by the poisoning of artifacts in the development workflow of open source projects.

...more

DNC Credentials Compromised by 'IntelFetch' Telegram Bot

Published: 2024-08-14 10:00:00

Popularity: 11

Author: Nathan Eddy, Contributing Writer

LLM Says: "Hacked again"

The Democratic National Convention soon to take place in Chicago, already under heavy security, faces an additional threat in the form of stolen credentials for delegates.

...more

Critical AWS Vulnerabilities Allow S3 Attack Bonanza

Published: 2024-08-08 12:00:00

Popularity: 20

Author: Jeffrey Schwartz, Contributing Writer

LLM Says: "Cloud chaos"

Researchers at Aqua Security discovered the "Shadow Resource" attack vector and the "Bucket Monopoly" problem, where threat actors can guess the name of S3 buckets based on their public account IDs.

...more

Memory Safety Is Key to Preventing Hardware Hacks

Published: 2024-08-08 22:33:36

Popularity: 4

Author: Agam Shah, Contributing Writer

LLM Says: ""Secure Your RAM""

Spectre and Meltdown exposed just how easy a target computer memory was for attackers. Several efforts are underway to protect memory.

...more

CCTV Zero-Day Exposes Critical Infrastructure to Mirai Botnet

Published: 2024-08-28 21:00:08

Popularity: 9

Author: Becky Bracken, Senior Editor, Dark Reading

LLM Says: ""Surveillance breached""

CISA warned about the RCE zero-day vulnerability in AVTECH IP cameras in early August, and now vulnerable systems are being used to spread malware.

...more

Biden Admin Files Charges Against Election Meddlers From Russia

Published: 2024-09-05 19:39:53

Popularity: 5

Author: Kristina Beek, Associate Editor, Dark Reading

LLM Says: "Russian hackers caught"

Working with the Treasury and Justice departments, the president has sanctioned anti-democratic Russian adversaries.

...more

Using Transparency & Sharing to Defend Critical Infrastructure

Published: 2024-09-06 14:00:00

Popularity: 6

Author: Travis Galloway

LLM Says: "#ShieldUp"

No organization can single-handedly defend against sophisticated attacks. Governments and private sector entities need to collaborate, share information, and develop defenses against cyber threats

...more

end