Summary

Top Articles:

  • How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools
  • Docker Vulnerability Opens Servers to Container Code
  • The Rise of "Purple Teaming"
  • NSA Issues Advisory for 'BlueKeep' Vulnerability
  • Vulnerability Leaves Container Images Without Passwords
  • Why FedRAMP Matters to Non-Federal Organizations
  • How a Nigerian ISP Accidentally Hijacked the Internet
  • Korean APT Adds Rare Bluetooth Device-Harvester Tool
  • Commercial Spyware Uses WhatsApp Flaw to Infect Phones
  • Trojanized TeamViewer Used in Targeted Attacks Against Multiple Embassies

The Rise of "Purple Teaming"

Published: 2019-06-13 14:30:00

Popularity: 279

Author: Joseph R. Salazar Technical Marketing Engineer

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.

...more

CrowdStrike Prices IPO Above Range at $34

Published: 2019-06-12 18:30:00

Popularity: 132

Author: Kelly Sheridan Staff Editor, Dark Reading

LLM Says: "IPO Pop!"

The endpoint security firm raised $612 million ahead of today's public debut.

...more

NSA Issues Advisory for 'BlueKeep' Vulnerability

Published: 2019-06-05 16:15:00

Popularity: 279

Author: Dark Reading Staff

The National Security Agency joins Microsoft in urging Windows admins to patch wormable bug CVE-2019-0708.

...more

Why FedRAMP Matters to Non-Federal Organizations

Published: 2019-06-04 18:00:00

Popularity: 207

Author: Daniel P. Kent Director, Public Sector Engineering & CTO, Cisco Systems

Commercial companies should explore how FedRAMP can help mitigate risk as they move to the cloud.

...more

Vulnerability Leaves Container Images Without Passwords

Published: 2019-05-30 22:00:00

Popularity: 211

Author: Curtis Franklin Jr. Senior Editor at Dark Reading

LLM Says: "Passwordless chaos"

A old vulnerability in Alpine Linux containers has spread and propagated to as much as 20% of the containers on the Docker Store.

...more

Docker Vulnerability Opens Servers to Container Code

Published: 2019-05-29 21:00:00

Popularity: 287

Author: Curtis Franklin Jr. Senior Editor at Dark Reading

LLM Says: "docker fail 💥"

Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE.

...more

Researcher Publishes Four Zero-Day Exploits in Three Days

Published: 2019-05-23 23:45:00

Popularity: 147

Author: Robert Lemos Contributing Writer

The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues.

...more

Learn to Hack Non-Competes & Sell 0-Days at Black Hat USA

Published: 2019-05-22 13:00:00

Popularity: 37

Author: Black Hat Staff

Plus, hear from key figures about the history and the enduring influence of The Cult of the Dead Cow this August in Las Vegas.

...more

Commercial Spyware Uses WhatsApp Flaw to Infect Phones

Published: 2019-05-14 21:44:00

Popularity: 184

Author: Robert Lemos Contributing Writer

A single flaw allowed attackers - thought to be linked to a government - to target human rights workers and install surveillance software by sending a phone request. The victims did not even have to answer.

...more

Korean APT Adds Rare Bluetooth Device-Harvester Tool

Published: 2019-05-13 22:20:00

Popularity: 201

Author: Jai Vijayan Contributing Writer

ScarCruft has evolved into a skilled and resourceful threat group, new research shows.

...more

How a Chinese Nation-State Group Reverse-Engineered NSA Attack Tools

Published: 2019-05-07 19:15:00

Popularity: 481

Author: Robert Lemos Contributing Writer

New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.

...more

How a Nigerian ISP Accidentally Hijacked the Internet

Published: 2019-04-25 18:30:00

Popularity: 205

Author: Marc Laliberte Senior Security Analyst, WatchGuard Technologies

For 74 minutes, traffic destined for Google and Cloudflare services was routed through Russia and into the largest system of censorship in the world, China's Great Firewall.

...more

Trojanized TeamViewer Used in Targeted Attacks Against Multiple Embassies

Published: 2019-04-22 22:00:00

Popularity: 170

Author: Jai Vijayan Freelance writer

Motive remains unclear though financial theft appears to be one possibility, Check Point Research says.

...more

APT34 Toolset, Victim Data Leaked via Telegram

Published: 2019-04-19 16:00:00

Popularity: 73

Author: Dark Reading Staff

For the last month, an unknown individual or group has been sharing data and hacking tools belonging to Iranian hacker group APT34.

...more

GPS Spoof Hits Geneva Motor Show

Published: 2019-03-13 19:00:00

Popularity: 67

Author: Dark Reading Staff

Incident leaves GPS units showing a location in England and a date 17 years in the future.

...more

Word Bug Allows Attackers to Sneak Exploits Past Anti-Malware Defenses

Published: 2019-03-05 23:40:00

Popularity: 120

Author: Jai Vijayan Freelance writer

NTT Security Confirms WhiteHat Acquisition

Published: 2019-03-06 13:00:00

Popularity: 5

Author: Dark Reading Staff

WhiteHat Security will continue to operate as an independent subsidiary of NTT Security following the deal.

...more

end