The high-severity CVE-2024-6387 in OpenSSH is a reintroduction of a 2006 flaw, and it allows unauthenticated RCE as root.
...moreTop Articles:
Published: 2024-07-01 19:38:55
Popularity: 25
Author: Tara Seals, Managing Editor, News, Dark Reading
The high-severity CVE-2024-6387 in OpenSSH is a reintroduction of a 2006 flaw, and it allows unauthenticated RCE as root.
...morePublished: 2024-06-28 21:22:05
Popularity: 38
Author: Dark Reading Staff
Despite warnings from Health-ISAC and the NCC Group, the remote access software maker says defense-in-depth kept customers' data safe from Midnight Blizzard.
...morePublished: 2024-07-02 23:50:14
Popularity: None
Author: Dark Reading
If security researchers can execute a guest-to-host attack using a zero-day vuln in the KVM open source hypervisor, Google will make it worth their while.
...morePublished: 2024-06-18 14:00:00
Popularity: 10
Author: Steve Weber
Forcing Microsoft to compete fairly is the most important next step in building a better defense against foreign actors.
...morePublished: 2024-06-18 20:23:24
Popularity: 32
Author: Nate Nelson, Contributing Writer
A trio of bugs could allow hackers to escalate privileges and remotely execute code on virtual machines deployed across cloud environments.
...morePublished: 2024-06-05 19:01:42
Popularity: 7
Author: Dark Reading Staff
Hijacking malware gets spread through TikTok's direct messaging and doesn't require the victim to click links or download anything.
...morePublished: 2024-06-07 16:55:39
Popularity: 5
Author: Nathan Eddy, Contributing Writer
CVE-2024-37364 affects hospitality kiosks from Ariane Systems, which are used for self-check-in at more than 3,000 hotels worldwide.
...morePublished: 2024-04-05 11:34:21
Popularity: None
Author: Elizabeth Montalbano, Contributing Writer
A researcher received a $5,500 bug bounty for discovering a vulnerability (CVE-2024-2879) in LayerSlider, a plug-in with more than a million active installations.
...morePublished: 2024-03-21 18:17:06
Popularity: 8
Author: Elizabeth Montalbano, Contributing Writer
Attackers can create a self-perpetuating, infinite scenario in such a way that volumes of traffic overwhelm network resources indefinitely.
...morePublished: 2024-03-21 17:13:23
Popularity: 13
Author: Nate Nelson, Contributing Writer
A bug exposed users of an AWS workflow management service to cookie tossing, but behind the scenes lies an even deeper issue that runs across all of the top cloud services.
...morePublished: 2024-03-14 19:43:25
Popularity: 125
Author: None
The hacktivist group Anonymous Sudan claims credit for a cyberattack that disrupted Alabama state government earlier this week.
...morePublished: 2024-03-08 03:00:22
Popularity: None
Author: Agam Shah, Contributing Writer
CISA and OpenSSF jointly published new guidance recommending technical controls to make it harder for developers to bring malicious software components into code.
...morePublished: 2024-03-08 17:22:50
Popularity: 45
Author: Tara Seals, Managing Editor, News, Dark Reading
The Midnight Blizzard APT is mounting a sustained, focused cyber campaign against the computing kahuna, using secrets it stole from emails back in January.
...morePublished: 2024-03-10 13:13:39
Popularity: None
Author: Nathan Eddy, Contributing Writer
The proof-of-concept exploits for Atlassian Confluence would enable arbitrary code execution without requiring file system access.
...morePublished: 2024-03-05 21:55:11
Popularity: 5
Author: Dark Reading Staff
The retired US Army lieutenant colonel faces up to 10 years in prison if convicted of sharing secret information about the Russia-Ukraine war with a scammer posing as romantic connection.
...morePublished: 2024-02-21 21:46:12
Popularity: 183
Author: Dark Reading Staff
Researchers tested their theory on nine chargers, each different and available to consumers, and found them all vulnerable to their attacks.
...morePublished: 2024-02-20 18:16:24
Popularity: 92
Author: Becky Bracken, Editor, Dark Reading
Thanks to a 24-year-old security vulnerability tracked as CVE-2023-50387, attackers could stall DNS servers with just a single malicious packet, effectively taking out wide swaths of the Internet.
...morePublished: 2024-02-20 21:38:03
Popularity: 21
Author: Dark Reading Staff
Improper content filtering in a core function allows multiple paths to exploitation for CVE-2024-21726.
...morePublished: 2024-02-01 21:00:00
Popularity: 4
Author: Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
US federal agencies have to disconnect, rebuild, and reconfigure all Ivanti Connect Secure and Policy Secure VPN appliances. This Tech Tip lists all the steps that need to happen.
...morePublished: 2024-02-01 22:20:00
Popularity: 8
Author: Dark Reading Staff
The threat actor behind the campaign is still unknown, but it shares some similarities with other cyptojacking groups.
...morePublished: 2024-02-02 13:00:00
Popularity: 16
Author: Tara Seals, Managing Editor, News, Dark Reading
The cyberattackers, believed to be state sponsored, didn't get far into Cloudflare's global network, but not for lack of trying.
...morePublished: 2024-02-02 15:23:33
Popularity: 7
Author: Becky Bracken, Editor, Dark Reading
The Indian state-sponsored cyberattackers lurked in Google's official app store, distributing a new RAT and spying on Pakistanis.
...morePublished: 2024-01-29 21:38:00
Popularity: 7
Author: Becky Bracken, Editor, Dark Reading
Responding to SEC charges, SolarWinds fired back with a detailed defense of how a Russian-backed cyber espionage attack on its system was handled.
...morePublished: 2024-01-25 15:00:00
Popularity: 11
Author: Mark Bowling
Post-SolarWinds, it's no longer enough for chief information security officers to remain compliant and call it a day.
...morePublished: 2024-01-25 16:40:00
Popularity: 16
Author: Elizabeth Montalbano, Contributing Writer
Misunderstanding the permissions of an authentication group in Google Kubernetes Engine (GKE) opens millions of containers to anyone with a Google account.
...morePublished: 2024-01-24 21:25:00
Popularity: 165
Author: Kristina Beek, Associate Editor, Dark Reading
And there were an additional 3,000 comments posted to the Dark Web about the sale of stolen ChatGPT accounts.
...morePublished: 2024-01-26 21:00:00
Popularity: 9
Author: Nate Nelson, Contributing Writer
The threat actor went more than half a decade before being discovered — thanks to a remarkable backdoor delivered in invisible adversary-in-the-middle attacks.
...morePublished: 2023-12-13 23:26:00
Popularity: 5
Author: Tara Seals, Managing Editor, News, Dark Reading
Russia's APT29 is going after a critical RCE flaw in the JetBrains TeamCity software developer platform, prompting governments worldwide to issue an urgent warning to patch.
...morePublished: 2023-12-21 21:15:00
Popularity: 13
Author: Becky Bracken, Editor, Dark Reading
Moscow's Rosvodokanal water-management company was ransacked by Ukraine-aligned Blackjack group, with reports that the company's IT infrastructure was "destroyed."
...morePublished: 2023-12-07 20:52:00
Popularity: 20
Author: None
"Tree of Attacks With Pruning" is the latest in a growing string of methods for eliciting unintended behavior from a large language model.
...morePublished: 2023-11-22 16:15:25
Popularity: 22
Author: Robert Lemos, Contributing Writer, Dark Reading
Kubernetes compromises have usually led to attackers creating cryptomining containers, but the outcomes could be much worse, say researchers presenting at the Black Hat Europe conference.
...morePublished: 2023-11-06 22:57:00
Popularity: 32
Author: Tara Seals, Managing Editor, News, Dark Reading
Admins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and credentials.
...morePublished: 2023-10-31 21:35:00
Popularity: 43
Author: Becky Bracken, Editor, Dark Reading
The legal actions may have a chilling effect on hiring CISOs, who are already in short supply, but may also expose just how budget-constrained most security executives are.
...morePublished: 2023-10-09 19:15:30
Popularity: 38
Author: Dark Reading Staff, Dark Reading
Thousands of devices, including D-Link and Zyxel gear, remain vulnerable to takeover despite the availability of patches for the several bugs being exploited by IZ1H9 campaign.
...morePublished: 2023-10-09 20:00:00
Popularity: 40
Author: Nathan Eddy, Contributing Writer, Dark Reading
Following the publication of the critical Linux security vulnerability, security specialists released PoC exploits to test the implications of CVE-2023-4911.
...morePublished: 2023-10-11 18:15:00
Popularity: 32
Author: Dark Reading Staff, Dark Reading
CISA flags use-after-free bug now being exploited in the wild.
...morePublished: 2023-10-12 20:23:45
Popularity: 17
Author: Tara Seals, Managing Editor, News, Dark Reading
Popular malware like QakBot and DarkGate rely on VBScript, which dates back to 1996 — but their days are numbered now that Microsoft is finally deprecating the Windows programming language.
...morePublished: 2023-10-20 18:05:00
Popularity: 17
Author: Dark Reading Staff, Dark Reading
Users could hold up to five SIM cards previously, but now they can only have two; it's a move that the government says is intended to cut down mobile spam levels.
...morePublished: 2023-10-25 19:38:00
Popularity: 211
Author: Becky Bracken, Editor, Dark Reading
VMware vCenter Servers need immediate patch against critical RCE bug as race against threat actors begins.
...morePublished: 2023-10-24 13:00:00
Popularity: 285
Author: Elizabeth Montalbano, Contributor, Dark Reading
Hundreds of millions of users of Grammarly, Vidio, and the Indonesian e-commerce giant Bukalapak are at risk for financial fraud and credential theft due to OAuth misfires — and other online services likely have the same problems.
...morePublished: 2023-09-26 15:23:51
Popularity: None
Author: Becky Bracken, Editor, Dark Reading
A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.
...morePublished: 2023-09-20 20:09:00
Popularity: 52
Author: Tara Seals, Managing Editor, News, Dark Reading
A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.
...morePublished: 2023-09-20 22:00:00
Popularity: 2
Author: Dark Reading Staff, Dark Reading
The Swedish maker of Yubikeys has merged with special purpose acquisition company ACQ Bure.
...morePublished: 2023-09-22 00:42:00
Popularity: 43
Author: Jeffrey Schwartz, Contributing Writer, Dark Reading
Cisco's surprise agreement could reshape secure information and event management (SIEM) and extended detection and response (XDR) markets.
...morePublished: 2023-09-26 12:37:49
Popularity: None
Author: Becky Bracken, Editor, Dark Reading
A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.
...morePublished: 2023-06-22 15:53:52
Popularity: 4887
Author: Dark Reading Staff, Dark Reading
A ready-made, low-complexity path to pwning the popular enterprise VPN clients for remote workers is now circulating in the wild.
...morePublished: 2023-06-02 21:02:58
Popularity: None
Author: Contributor, Dark Reading
No activity logging in the free subscription for Google's Web-based productivity suite exposes enterprises to insider and other threats, researchers say.
...morePublished: 2023-05-11 19:00:00
Popularity: 37
Author: Dark Reading Staff, Dark Reading
Corgan got FBI involved to track down the cybercriminal, who had stolen from other artists as well, he said.
...morePublished: 2023-05-17 18:21:29
Popularity: None
Author: Robert Lemos, Contributing Writer, Dark Reading
DNS rebinding attacks are not often seen in the wild, which is one reason why browser makers have taken a slower approach to adopting the web security standard.
...morePublished: 2023-05-18 15:27:00
Popularity: 15
Author: Nathan Eddy, Contributing Writer, Dark Reading
Turkorat-poisoned packages sat in the npm development library for months, researchers say.
...morePublished: 2023-05-22 19:29:00
Popularity: 32
Author: Dark Reading Staff, Dark Reading
The technology conglomerate has until later this year to end its transfer of European user's data across the Atlantic.
...morePublished: 2023-05-22 20:52:00
Popularity: 45
Author: Nate Nelson, Contributing Writer, Dark Reading
The climate of concern around open source security and supply chain attacks may have caused a small story to become a big one.
...morePublished: 2023-05-25 21:50:00
Popularity: 93
Author: Jeffrey Schwartz, Contributing Writer, Dark Reading
The new Red Hat Trusted Software Supply Chain services help developers take a secure-by-design approach to build, deploy, and monitor software.
...morePublished: 2023-05-26 17:32:00
Popularity: 28
Author: Dark Reading Staff, Dark Reading
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
...morePublished: 2023-05-31 01:25:00
Popularity: 12
Author: Ericka Chickowski, Contributing Writer, Dark Reading
As the second Kaminsky Fellow, Andrews will study the use of threat intelligence to track campaigns against the human rights community.
...morePublished: 2023-05-31 21:08:00
Popularity: 192
Author: Dark Reading Staff, Dark Reading
The newly found misconfigured cloud services are discovered just two weeks after an initial data breach affecting millions came to light.
...morePublished: 2023-05-30 21:39:00
Popularity: 48
Author: Dark Reading Staff, Dark Reading
On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.
...morePublished: 2023-05-19 13:05:00
Popularity: 34
Author: Becky Bracken, Editor, Dark Reading
New rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.
...morePublished: 2023-04-06 19:20:29
Popularity: 94
Author: Dark Reading Staff, Dark Reading
A flaw in Twitter code allows bot abuse to trick the algorithm into suppressing certain accounts.
...morePublished: 2023-03-30 18:58:13
Popularity: 50
Author: Elizabeth Montalbano, Contributor, Dark Reading
The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform's nodes.
...morePublished: 2023-03-24 20:05:00
Popularity: 106
Author: Dark Reading Staff, Dark Reading
GitHub hastens to replace its RSA SSH host key after an exposure mishap threatens users with man-in-the-middle attacks and organization impersonation.
...morePublished: 2023-03-08 17:36:54
Popularity: None
Author: Dark Reading
A team has found that the Crystals-Kyber encryption algorithm is open to side-channel attacks, under certain implementations.
...morePublished: 2023-03-02 16:16:00
Popularity: 15
Author: Elizabeth Montalbano, Contributor, Dark Reading
Researchers exploited issues in the authentication protocol to force an open redirection from the popular hotel reservations site when users used Facebook to log in to accounts.
...morePublished: 2023-02-28 17:43:44
Popularity: 19
Author: Robert Lemos, Contributing Writer, Dark Reading
The opportunistic "SCARLETEEL" attack on a firm's Amazon Web Services account turns into targeted data theft after the intruder uses an overpermissioned service to jump into cloud system.
...morePublished: 2023-01-30 19:00:00
Popularity: 67
Author: Dark Reading Staff, Dark Reading
The Instagram rate-limiting bug, found by a rookie hunter, could be exploited to bypass Facebook 2FA in vulnerable apps, researcher reports.
...morePublished: 2023-02-20 14:01:00
Popularity: 35
Author: Michael Bargury, CTO & Co-Founder, Zenity
What's scarier than keeping all of your passwords in one place and having that place raided by hackers? Maybe reusing insecure passwords.
...morePublished: 2023-02-24 00:03:00
Popularity: 53
Author: Jeffrey Schwartz, Contributing Writer, Dark Reading
At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.
...morePublished: 2023-02-01 14:18:08
Popularity: 24
Author: Dark Reading Staff, Dark Reading
Google Fi mobile customers have been alerted that their SIM card serial numbers, phone numbers, and other data were exposed in T-Mobile hack.
...morePublished: 2023-02-08 22:05:00
Popularity: 66
Author: Dark Reading Staff, Dark Reading
Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls.
...morePublished: 2023-01-26 02:45:40
Popularity: None
Author: Dark Reading
Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.
...morePublished: 2023-01-23 15:00:00
Popularity: 143
Author: Jim Simpson, Director of Threat Intelligence, Searchlight Cyber
Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.
...morePublished: 2023-01-09 17:45:00
Popularity: 147
Author: Nathan Eddy, Contributing Writer, Dark Reading
The JsonWebToken package plays a big role in the authentication and authorization functionality for many applications.
...morePublished: 2022-12-22 15:00:01
Popularity: 17
Author: Nathan Eddy, Contributing Writer, Dark Reading
A successful attacker could use the SSRF vulnerability to collect metadata from WordPress sites hosted on an AWS server, and potentially log in to a cloud instance to run commands.
...morePublished: 2022-12-23 18:18:27
Popularity: 29
Author: Tara Seals, Managing Editor, News, Dark Reading
A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes pod to steal data and inject malware.
...morePublished: 2022-12-08 14:12:04
Popularity: 119
Author: Elizabeth Montalbano, Contributor, Dark Reading
Common mistakes in network configuration can jeopardize the security of highly protected assets and allow attackers to steal critical data from the enterprise.
...morePublished: 2022-11-29 18:15:00
Popularity: 40
Author: Becky Bracken, Editor, Dark Reading
Elon Musk-owned Starlink, WhiteHouse.gov, and the Prince of Wales were targeted by Killnet in apparent retaliation for its support of Ukraine.
...morePublished: 2022-11-28 18:11:09
Popularity: 59
Author: Dark Reading Staff, Dark Reading
Meta has been found in violation of Europe's GDPR rules requiring the social media giant to protect user data by "design and default."
...morePublished: 2022-10-11 17:49:46
Popularity: 66
Author: Dark Reading Staff, Dark Reading
Exposed code included private key for Intel Boot Guard, meaning it can no longer be trusted, according to a researcher.
...morePublished: 2022-10-11 14:23:07
Popularity: 56
Author: Elizabeth Montalbano, Contributor, Dark Reading
Attackers could exploit the "Sandbreak" security bug, which has earned a 10 out of 10 on the CVSS scale, to execute a sandbox escape, achieve RCE, and run shell commands on a hosting machine.
...morePublished: 2022-10-12 16:20:35
Popularity: 14
Author: Elizabeth Montalbano, Contributor, Dark Reading
The platform lets network connectivity data escape outside of the secure tunnel when connected to a public network, posing a "privacy concern" for users with "certain threat models," researchers said.
...morePublished: 2022-10-17 17:54:37
Popularity: 18
Author: Dark Reading Staff, Dark Reading
Main driver for the change: "Plaintext SMS messages are inherently insecure."
...morePublished: 2022-10-05 20:00:00
Popularity: 59
Author: Dark Reading Staff, Dark Reading
With just one malformed Zigbee frame, attackers could take over certain Ikea smart lightbulbs, leaving users unable to turn the lights down.
...morePublished: 2022-09-14 00:59:31
Popularity: 15
Author: Edge Editors, Dark Reading
Twitter did not know what data it had or who had access to it, Peiter "Mudge" Zatko told Congressional lawmakers during a Senate panel hearing.
...morePublished: 2022-09-23 20:04:00
Popularity: 181
Author: Becky Bracken, Editor, Dark Reading
The ongoing ad fraud campaign can be traced back to 2019, but recently expanded into the iOS ecosystem, researchers say.
...morePublished: 2022-09-20 17:37:16
Popularity: 131
Author: Elizabeth Montalbano, Contributor, Dark Reading
It's called "spell-jacking": Both browsers have spell-check features that send data to Microsoft and Google when users fill out forms for websites or Web services.
...morePublished: 2022-08-16 18:51:56
Popularity: 19
Author: Dark Reading Staff, Dark Reading
Just as one crop of malware-laced software packages is taken down from the popular Python code repository, a new host arrives, looking to steal a raft of data.
...morePublished: 2022-08-30 14:16:23
Popularity: 35
Author: Elizabeth Montalbano, Contributor, Dark Reading
The first-of-its-kind campaign threatens to remove code packages if developers don’t submit their code to a "validation" process.
...morePublished: 2022-08-30 20:00:00
Popularity: 19
Author: Dark Reading Staff, Dark Reading
Analysts find five cookie-stuffing extensions, including one that's Netflix-themed, that track victim browsing and insert rogue IDs into e-commerce sites to rack up fake affiliate payments.
...morePublished: 2022-07-27 18:49:47
Popularity: 950
Author: Tara Seals, Managing Editor, News, Dark Reading
Microsoft flagged the company's Subzero tool set as on offer to unscrupulous governments and shady business interests.
...morePublished: 2022-07-18 17:55:01
Popularity: 29
Author: Dark Reading Staff, Dark Reading
An ongoing campaign is actively targeting the vulnerability in the Kaswara Modern WPBakery Page Builder Addon, which is still installed on up to 8,000 sites, security analysts warn.
...morePublished: 2022-07-12 22:42:37
Popularity: 23
Author: Dark Reading Staff, Dark Reading
Python's most popular package manager is intent on securing the supply chain by requiring developers to enable two-factor authentication.
...morePublished: 2022-07-01 19:09:27
Popularity: 13817
Author: Becky Bracken, Editor, Dark Reading
OpenSea warns users that they are likely to be targeted in phishing attacks after a vendor employee accessed and downloaded its email list.
...morePublished: 2022-06-20 21:25:39
Popularity: 25
Author: Tara Seals, Managing Editor, News, Dark Reading
After bragging in underground forums, the woman who stole 100 million credit applications from Capital One has been found guilty.
...morePublished: 2022-06-17 18:53:38
Popularity: 4200
Author: Dark Reading Staff, Dark Reading
The code injection vulnerability is being actively exploited in the wild, researchers say.
...morePublished: 2022-06-13 19:43:16
Popularity: 9178
Author: Dark Reading Staff, Dark Reading
Public Travis CI logs loaded with GitHub, AWS, Docker Hub account tokens, and other sensitive data could be leveraged for lateral cloud attacks.
...morePublished: 2022-05-25 19:21:04
Popularity: 36
Author: Tara Seals, Managing Editor, News, Dark Reading
Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.
...morePublished: 2022-05-03 20:35:19
Popularity: 451
Author: Dark Reading Staff, Dark Reading
The same infrastructure traced back to Russian-speaking threat group Nobelium is being used to set up misspelled domain names, presaging impersonation attacks bent on credential harvesting, analysts say.
...morePublished: 2022-05-05 21:21:52
Popularity: 29
Author: Jai Vijayan, Contributing Writer
The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says.
...morePublished: 2022-01-11 19:05:00
Popularity: 20
Author: Dark Reading Staff, Dark Reading
The most serious of the five vulnerabilities disclosed today can lead to unauthenticated remote code execution on affected devices.
...morePublished: 2021-12-10 12:38:27
Popularity: 24
Author: Fahmida Y. Rashid, Features Editor, Dark Reading
RLBox can be used to protect web browsers and other software applications from vulnerabilities in subcomponents and libraries.
...morePublished: 2021-11-10 14:30:00
Popularity: 34
Author: Kelly Jackson Higgins, Executive Editor
AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.
...morePublished: 2021-11-15 22:23:23
Popularity: 27
Author: Robert Lemos, Contributing Writer
Attackers targeted Chinese pro-democracy groups using a vulnerability fixed in September along with a second vulnerability fixed early in the year, Google says.
...morePublished: 2021-09-29 15:26:23
Popularity: 17
Author: Asaf Karas, CTO. JFrog Security
HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration.
...morePublished: 2021-07-19 18:53:00
Popularity: 28
Author: Dark Reading Staff
An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world.
...morePublished: 2021-07-07 18:54:00
Popularity: 16
Author: Dark Reading Staff
The deal was announced the same day ZeroFox bought Dark Web intelligence firm Vigilante as a wave of security M&A continues.
...morePublished: 2021-07-06 21:42:00
Popularity: 19
Author: Kelly Sheridan Staff Editor, Dark Reading
Published: 2021-06-22 17:26:00
Popularity: 18
Author: Dark Reading Staff
The framework, now available through MITRE, provides countermeasures to attacks.
...morePublished: 2021-06-25 15:00:00
Popularity: 27
Author: Dark Reading Staff
Andrii Kolpakov, who served as a high-level pentester for the criminal group, was also ordered to pay $2.5 million in restitution.
...morePublished: 2021-06-17 20:50:00
Popularity: 5
Author: Dark Reading Staff
The "Supply chain Levels for Software Artifacts" aims to ensure the integrity of components throughout the software supply chain.
...morePublished: 2021-06-02 17:42:00
Popularity: 20
Author: Dark Reading Staff
The plug-in under active attack has been installed on more than 17,000 websites, say researchers.
...morePublished: 2021-05-25 18:32:00
Popularity: 21
Author: Dark Reading Staff
FBI says sales from illicit online shop deer.io exceeded $17 million
...morePublished: 2021-05-26 20:32:00
Popularity: 424
Author: Dark Reading Staff
Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.
...morePublished: 2021-05-11 21:02:00
Popularity: 3023
Author: Dark Reading Staff
The vulnerability is being exploited in limited attacks against Adobe Reader users on Windows.
...morePublished: 2021-05-04 21:21:00
Popularity: 34
Author: Dark Reading Staff
Published: 2021-04-29 19:49:00
Popularity: 78
Author: Dark Reading Staff
Student researcher is concerned security gap may exist on many other sites.
...morePublished: 2021-01-06 22:00:00
Popularity: 583
Author: Dark Reading Staff
Leaked information includes source code of Nissan mobile apps, diagnostics tool, and market research tools and data, among other assets.
...morePublished: 2021-01-04 19:10:00
Popularity: 151
Author: Dark Reading Staff
The wireless carrier has suffered a data breach for the fourth time since 2018.
...morePublished: 2020-12-31 13:30:00
Popularity: 93
Author: Kelly Jackson Higgins Executive Editor at Dark Reading
Despite a pandemic and possibly the worst cyberattack campaign ever waged against the US, the year still had some bright spots when it came to "good" and creative hacks.
...morePublished: 2020-12-04 15:00:00
Popularity: 68
Author: Rotem Iram Founder & CEO, At-Bay
Flash will be gone by the end of the year, but the ecosystem that allowed it to become a software security serial killer is ready to let it happen again.
...morePublished: 2020-12-22 16:35:00
Popularity: 83
Author: Dark Reading Staff
The United States and international partners shut down three bulletproof hosting services used to facilitate criminal activity.
...morePublished: 2020-12-21 22:25:00
Popularity: 135
Author: Dark Reading Staff
The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code.
...morePublished: 2020-09-04 17:20:00
Popularity: 85
Author: Robert Lemos Contributing Writer
A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional.
...morePublished: 2020-09-08 19:00:00
Popularity: 95
Author: Dark Reading Staff
The vulnerability in WordPress File Manager could allow a malicious actor to take over the victim's website.
...morePublished: 2020-08-17 18:00:00
Popularity: 268
Author: Dark Reading Staff
Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.
...morePublished: 2020-07-29 19:10:00
Popularity: 110
Author: Dark Reading Staff
A vulnerability in the wpDiscuz plug-in could let attackers remotely execute code on the servers of affected websites.
...morePublished: 2020-07-23 17:15:00
Popularity: 23
Author: Dark Reading Staff
The service has reportedly hired a security firm after 17 million user records were found on a public hacking forum.
...morePublished: 2020-06-16 20:45:00
Popularity: 12
Author: Dark Reading Staff
The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.
...morePublished: 2020-06-17 21:40:00
Popularity: 101
Author: Dark Reading Staff
The videoconferencing company now says it will offer end-to-end encryption to all users beginning in July.
...morePublished: 2020-06-16 20:45:00
Popularity: 69
Author: Dark Reading Staff
The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.
...morePublished: 2020-06-10 17:45:00
Popularity: 183
Author: Dark Reading Staff
Researchers find 12 Android applications disguised as official COVID-19 contact tracing apps installing malware onto devices.
...morePublished: 2020-06-01 17:35:00
Popularity: 189
Author: Robert Lemos Contributing Writer
The Sandworm group -- behind disinformation and election-hacking campaigns and responsible for a 2016 power outage in the Ukraine -- is now targeting e-mail servers.
...morePublished: 2020-05-28 18:15:00
Popularity: 114
Author: Dark Reading Staff
The Russian military group has been exploiting a flaw in the Exim mail transfer agent since last August, the NSA reports.
...morePublished: 2020-05-07 16:15:00
Popularity: 73
Author: Dark Reading Staff
The company's first acquisition to date is part of a 90-day plan to improve security in its video communications platform.
...morePublished: 2020-04-30 16:00:00
Popularity: 94
Author: Robert Lemos Contributing Writer
As more students move to online learning platforms, vulnerability researchers are revealing security flaws in some common software plug-ins.
...morePublished: 2020-04-25 13:30:00
Popularity: 142
Author: Nicole Ferraro Freelance Writer
As more so-called Internet of Medical Things devices go online, hospitals and medical facilities face significant challenges in securing them from attacks that could endanger patients' lives.
...morePublished: 2020-04-06 15:45:00
Popularity: 103
Author: Dark Reading Staff
The latest release of Firefox brings fixes for two Critical vulnerabilities already seen exploited in the wild.
...morePublished: 2020-03-20 16:45:00
Popularity: 90
Author: Dark Reading Staff
The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices.
...morePublished: 2020-02-25 18:30:00
Popularity: 48
Author: Robert Lemos Contributing Writer
Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform.
...morePublished: 2020-02-26 15:15:00
Popularity: 276
Author: Robert Lemos Contributing Writer
Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.
...morePublished: 2020-03-02 17:45:00
Popularity: 265
Author: Dark Reading Staff
Visser Precision has confirmed a security incident likely caused by the data-stealing DoppelPaymer ransomware.
...morePublished: 2020-02-28 01:00:00
Popularity: 170
Author: Dark Reading Staff
Customers for the controversial facial recognition company were detailed in a log file leaked to news organizations.
...morePublished: 2020-02-04 15:45:00
Popularity: 75
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.
...morePublished: 2020-01-30 18:10:00
Popularity: 138
Author: Dark Reading Staff
A remote code execution flaw enabled a breach of UN offices in Geneva and Vienna, as well as the Office of the High Commissioner for Human Rights.
...morePublished: 2020-01-29 00:30:00
Popularity: 134
Author: Dark Reading Staff
Hackers claiming to be from the hacktivist group OurMine temporarily took over Twitter accounts of the NFL and several teams in the league.
...morePublished: 2020-01-24 21:30:00
Popularity: 128
Author: Dark Reading Staff
Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.
...morePublished: 2020-01-06 22:20:00
Popularity: 134
Author: Kelly Sheridan Staff Editor, Dark Reading
The active attack involving three malicious Android applications is the first exploiting CVE-2019-2215, Trend Micro researchers report.
...morePublished: 2020-01-09 01:45:00
Popularity: 205
Author: Dark Reading Staff
The attack, still under investigation, hit early in the morning of Jan. 7.
...morePublished: 2019-12-17 16:40:00
Popularity: 92
Author: Dark Reading Staff
David Tinley, 62, rigged software he wrote for the company starting in 2014 and into 2016, causing the programs to fail.
...morePublished: 2019-12-10 23:30:00
Popularity: 156
Author: Kelly Jackson Higgins Executive Editor at Dark Reading
A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets.
...morePublished: 2019-12-10 20:50:00
Popularity: 70
Author: Dark Reading Staff
Researchers found three broad types of vulnerabilities, one of which should be particularly concerning to consumers.
...morePublished: 2019-12-10 21:30:00
Popularity: 74
Author: Kelly Sheridan Staff Editor, Dark Reading
This month's batch of security updates addresses 36 CVEs, seven of which are rated Critical and one of which has been exploited in the wild.
...morePublished: 2019-12-04 15:45:00
Popularity: 53
Author: Robert Lemos Contributing Writer
Published: 2019-10-01 21:10:00
Popularity: 158
Author: Kelly Sheridan Staff Editor, Dark Reading
The "Prying-Eye" vulnerability could let intruders scan for unprotected meeting IDs and snoop on conference calls.
...morePublished: 2019-10-08 20:55:00
Popularity: 219
Author: Dark Reading Staff
Vulnerabilities with Pulse Secure, Fortinet, and Palo Alto Networks VPNs are called out in the advisory.
...morePublished: 2019-09-30 15:00:00
Popularity: 285
Author: Dark Reading Staff
The same attacker was reportedly behind the Collection #1 and Collection #2 data dumps earlier this year.
...morePublished: 2019-09-27 14:30:00
Popularity: 145
Author: Dark Reading Staff
The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.
...morePublished: 2019-09-16 17:40:00
Popularity: 69
Author: Kelly Sheridan Staff Editor, Dark Reading
An unsecured database containing 18GB of data exposed more than 20 million records, most of which held details about Ecuadorian citizens.
...morePublished: 2019-09-16 18:00:00
Popularity: 76
Author: Dark Reading Staff
US appeals court said a company can legally use publicly available LinkedIn account information.
...morePublished: 2019-08-23 15:30:00
Popularity: 70
Author: Dark Reading Staff
Virtual machine giant's big cloud move includes plans to shell out $2.7 billion in stock transactions for Pivotal Software.
...morePublished: 2019-08-27 21:00:00
Popularity: 110
Author: Dark Reading Staff
A subset of customers for the company's Incapsula web application firewall had their email addresses, hashed/salted passwords, and more open to unauthorized access, Imperva announced.
...morePublished: 2019-08-12 21:30:00
Popularity: 131
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
Attackers can use vulnerable drivers to escalate privilege and execute malicious code in every part of the system.
...morePublished: 2019-08-13 16:20:00
Popularity: 163
Author: Dark Reading Staff
Cybercriminals reportedly stole the information from an exposed MongoDB database on a third-party server.
...morePublished: 2019-08-14 15:30:00
Popularity: 177
Author: Dark Reading Staff
Thousands of organizations, including banks, governments, and the UK Metropolitan Police, use the biometric security tool to authenticate users.
...morePublished: 2019-07-26 19:10:00
Popularity: 141
Author: Dark Reading Staff
Marcus Hutchins, the researcher known for stopping WannaCry, avoids jail time over charges of creating and distributing Kronos malware.
...morePublished: 2019-07-19 17:30:00
Popularity: 164
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.
...morePublished: 2019-07-16 21:20:00
Popularity: 192
Author: Jai Vijayan Contributing Writer
More than 5,100 vulnerable devices containing multiple terabytes of data are open to exploitation, researchers found.
...morePublished: 2019-07-10 17:30:00
Popularity: 92
Author: Dark Reading Staff
GE Healthcare has released a statement claiming the bug is not in the machine itself and does not pose direct risk to patients.
...morePublished: 2019-07-04 03:30:00
Popularity: 186
Author: Dark Reading Staff
A settlement with the FTC should mean comprehensive security upgrades for D-Link routers and IP camera.
...morePublished: 2019-06-27 18:45:00
Popularity: 183
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code.
...morePublished: 2019-06-27 22:30:00
Popularity: 73
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.
...morePublished: 2019-06-28 15:40:00
Popularity: 218
Author: Dark Reading Staff
Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.
...morePublished: 2024-05-16 12:48:06
Popularity: 15
Author: Dark Reading Staff
Google has rolled an emergency patch for CVE-2024-4947, the third Chrome zero-day it's addressed in the past week.
...morePublished: 2024-05-17 18:03:51
Popularity: 8
Author: Dark Reading Staff
Financial firms covered under new regulations will be required to establish a clear response and communications plan for customer data breaches.
...morePublished: 2024-05-17 12:00:00
Popularity: 63
Author: Nate Nelson, Contributing Writer
A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever — and time is running short before ZDI releases exploit details.
...morePublished: 2024-05-15 15:42:28
Popularity: 10
Author: Elizabeth Montalbano, Contributing Writer
A vulnerability in the HNAP login request protocol that affects a family of devices gives unauthenticated users root access for command execution.
...morePublished: 2024-05-08 13:00:00
Popularity: 54
Author: Jai Vijayan, Contributing Writer
At least a portion of executive compensation going forward will be tied to meeting security goals and metrics.
...morePublished: 2024-05-10 18:21:29
Popularity: 9
Author: Nate Nelson, Contributing Writer
CISA's agreement is voluntary and, frankly, basic. Signatories say that's a good thing.
...morePublished: 2024-04-23 13:21:39
Popularity: 14
Author: Elizabeth Montalbano, Contributing Writer
The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE-2022-38028 in cyber-espionage attacks against targets in Ukraine, Western Europe, and North America.
...morePublished: 2024-04-25 15:59:45
Popularity: 6
Author: Elizabeth Montalbano, Contributing Writer
Attacks by a previously unknown threat actor leveraged two bugs in firewall devices to install custom backdoors on several government networks globally.
...morePublished: 2024-05-20 19:31:25
Popularity: 95
Author: Nate Nelson, Contributing Writer
An on-by-default endpoint in ubiquitous logging service Fluent Bit contains an oversight that hackers can toy with to rattle most any cloud environment.
...morePublished: 2024-05-30 15:43:41
Popularity: 6
Author: Elizabeth Montalbano, Contributing Writer
This time it's the identity management service provider's cross-origin authentication feature that's being targeted by adversaries.
...morePublished: 2024-05-20 19:03:41
Popularity: 28
Author: Kristina Beek, Associate Editor, Dark Reading
UCSC students say that after reporting the bug months ago, they're still able to rack up unlimited free wash loads at their local laundromat.
...morePublished: 2024-07-01 20:35:22
Popularity: 12
Author: Dark Reading Staff
If security researchers can execute a guest-to-host attack using a zero-day vulnerability in the KVM open source hypervisor, Google will make it worth their while.
...morePublished: 2024-07-17 14:00:00
Popularity: 18
Author: Stephanie Schneider
Credential management gets a boost with the latest infostealers' extortion campaign built on info stolen from cloud storage systems.
...morePublished: 2024-07-18 17:53:43
Popularity: 21
Author: Elizabeth Montalbano, Contributing Writer
Three newly discovered SMTP smuggling attack techniques can exploit misconfigurations and design decisions made by at least 50 email-hosting providers.
...morePublished: 2024-07-18 21:04:59
Popularity: 14
Author: Dark Reading Staff
Though the number of victims has risen, the actual number of breaches has gone down, as fewer, bigger breaches affect more individuals.
...morePublished: 2024-07-18 21:43:20
Popularity: 7
Author: Becky Bracken, Senior Editor, Dark Reading
Judge dismisses claims against SolarWinds for actions taken after its systems had been breached, but allows the case to proceed for alleged misstatements prior to the incident.
...morePublished: 2024-07-22 18:18:55
Popularity: 145
Author: Elizabeth Montalbano, Contributing Writer
Apps like Tinder, Bumble, Grindr, Badoo, OKCupid, MeetMe, and Hinge all have API vulnerabilities that expose sensitive user data, and six allow a threat actor to pinpoint exactly where someone is.
...morePublished: 2024-07-22 20:29:12
Popularity: 6
Author: None
Published: 2024-07-23 14:00:00
Popularity: 8
Author: Eric Braun
A unified standard is essential for realizing the full potential of SBOMs in enhancing software supply chain security.
...morePublished: 2024-07-23 16:21:16
Popularity: 7
Author: Elizabeth Montalbano, Contributing Writer
An exploit sold on an underground forum requires user action to download an unspecified malicious payload.
...morePublished: 2024-07-23 19:16:12
Popularity: 41
Author: Jeffrey Schwartz, Contributing Writer
Accenture researcher undercut WHfB's default authentication using open source Evilginx adversary-in-the-middle (AitM) reverse-proxy attack framework.
...morePublished: 2024-07-26 20:36:57
Popularity: 7
Author: Dark Reading Staff
Researchers track the healthcare sector as experiencing the biggest financial losses, with banking and transportation following close behind.
...morePublished: 2024-07-25 15:32:05
Popularity: 22
Author: Elizabeth Montalbano, Contributing Writer
A software engineer hired for an internal IT AI team immediately became an insider threat by loading malware onto his workstation.
...morePublished: 2024-07-25 20:51:01
Popularity: 43
Author: Nate Nelson, Contributing Writer
The fake updates are part of a phishing and fraud surge that is both more voluminous and more targeted that the usual activity around national news stories.
...morePublished: 2024-08-22 19:42:04
Popularity: None
Author: Nate Nelson, Contributing Writer
A 7-month-old bug in an OSS CI/CD server is still being actively exploited, thanks to spotty patching, CISA warns.
...morePublished: 2024-08-14 14:16:57
Popularity: 22
Author: Elizabeth Montalbano, Contributing Writer
Cloud services and thus millions of end users who access them could have been affected by the poisoning of artifacts in the development workflow of open source projects.
...morePublished: 2024-08-14 10:00:00
Popularity: 11
Author: Nathan Eddy, Contributing Writer
The Democratic National Convention soon to take place in Chicago, already under heavy security, faces an additional threat in the form of stolen credentials for delegates.
...morePublished: 2024-08-08 12:00:00
Popularity: 20
Author: Jeffrey Schwartz, Contributing Writer
Researchers at Aqua Security discovered the "Shadow Resource" attack vector and the "Bucket Monopoly" problem, where threat actors can guess the name of S3 buckets based on their public account IDs.
...morePublished: 2024-08-08 22:33:36
Popularity: 4
Author: Agam Shah, Contributing Writer
Spectre and Meltdown exposed just how easy a target computer memory was for attackers. Several efforts are underway to protect memory.
...morePublished: 2024-08-28 21:00:08
Popularity: 9
Author: Becky Bracken, Senior Editor, Dark Reading
CISA warned about the RCE zero-day vulnerability in AVTECH IP cameras in early August, and now vulnerable systems are being used to spread malware.
...morePublished: 2024-09-05 19:39:53
Popularity: 5
Author: Kristina Beek, Associate Editor, Dark Reading
Working with the Treasury and Justice departments, the president has sanctioned anti-democratic Russian adversaries.
...morePublished: 2024-09-06 14:00:00
Popularity: 6
Author: Travis Galloway
No organization can single-handedly defend against sophisticated attacks. Governments and private sector entities need to collaborate, share information, and develop defenses against cyber threats
...morePublished: 2024-09-21 20:29:58
Popularity: None
Author: Dark Reading
Critical-rated CVE-2024-20017 allows remote code execution (RCE) on a range of phones and Wi-Fi access points from a variety of OEMs.
...morePublished: 2024-09-11 13:00:44
Popularity: 62
Author: Nate Nelson, Contributing Writer
In the "PixHell" attack, sound waves generated by pixels on a screen can transmit information across seemingly impenetrable air gaps.
...morePublished: 2024-09-10 21:47:40
Popularity: 4
Author: Jennifer Lawinski, Contributing Writer
Wiz Code identifies and flags cloud risks in code to help improve collaboration between security and development teams.
...morePublished: 2024-10-02 15:18:01
Popularity: 6
Author: Elizabeth Montalbano, Contributing Writer
The prolific Chinese APT Mustang Panda is the likely culprit behind a sophisticated cyber-espionage attack that sets up persistent remote access to victim machines.
...morePublished: 2024-09-16 21:04:22
Popularity: 8
Author: Dark Reading Staff
Three days after Ivanti published an advisory about the high-severity vulnerability CVE-2024-8190, threat actors began to abuse the flaw.
...morePublished: 2024-09-17 21:26:38
Popularity: 14
Author: Nate Nelson, Contributing Writer
A researcher bypassed the Calendar sandbox, Gatekeeper, and TCC in a chain attack that allowed for wanton theft of iCloud photos.
...morePublished: 2024-09-26 12:30:38
Popularity: 157
Author: Edge Editors
The latest draft version of NIST's password guidelines simplifies password management best practices and eliminates those that did not promote stronger security.
...morePublished: 2024-10-10 21:10:13
Popularity: 24
Author: Dark Reading Staff
The bug is already being exploited in the wild, but Firefox has provided patches for those who may be vulnerable.
...morePublished: 2024-10-17 18:26:49
Popularity: 38
Author: Kristina Beek, Associate Editor, Dark Reading
Days after facing a major breach, the site is still struggling to get fully back on its feet.
...more