Dark Reading

Microsoft Patches Leaked Remote Code Execution Flaw

03/12/2020
A vulnerability in Microsoft's Server Message Block protocol prompted concerns of wormable exploits when it was disclosed this week.

Back to the Future: A Threat Intelligence Journey

03/12/2020
Threat intelligence needs the problem solvers, the curious ones, the mission seekers, the analytical minds, the defenders, and the fierce -- whatever their gender.

Blacklists Miss 21% of Phishing Attacks, Internet Traffic Reveals

03/11/2020
Visibility into phishing attacks by content delivery networks and security firms shows many domains fail to be classified as malicious.

Why CSP Isn't Enough to Stop Magecart-Like Attacks

03/11/2020
As Magecart and formjacking attacks become more sophisticated, it's essential to address not only what services may interact with users, but what that interaction looks like and how to control it.

Paradise Ransomware Variant Hides in Office IQY Files

03/10/2020
The uncommon Internet Query file format lets attacks slip past defenses to effectively break into target networks.

What Should I Do About Vulnerabilities Without Fixes?

03/10/2020
With better tools that identify potential threats even before developers address them, a new problem has arisen.

How Network Metadata Can Transform Compromise Assessment

03/10/2020
Listen more closely and your network's metadata will surrender insights the bad guys counted on keeping secret

Malware Campaign Feeds on Coronavirus Fears

03/09/2020
A new malware campaign that offers a "coronavirus map" delivers a well-known data-stealer.

WatchGuard Buys Panda Security for Endpoint Security Tech

03/09/2020
In the long term, Panda Security's technologies will be integrated into the WatchGuard platform.

Threat Awareness: A Critical First Step in Detecting Adversaries

03/09/2020
One thing seems certain: Attackers are only getting more devious and lethal. Expect to see more advanced attacks.

Physical Flaws: Intel's Root-of-Trust Issue Mostly Mitigated

03/06/2020
An insider, or security expert with physical access, can compromise the hardware protections of Intel chips sold in the past five years.

Securing Our Elections Requires Change in Technology, People & Attitudes

03/06/2020
Increasing security around our election process and systems will take a big effort from many different parties. Here's how.

Advanced Tech Needs More Ethical Consideration & Security

03/05/2020
Unintended consequences and risks need board-level attention and action.

The Perfect Travel Security Policy for a Globe-Trotting Laptop

03/04/2020
There are many challenges to safely carrying data and equipment on international travels, but the right policy can make navigating the challenges easier and more successful.

Cathay Pacific Hit with Fine for Long-Lasting Breach

03/04/2020
The breach, which was active for four years, resulted in the theft of personal information on more than 9 million people.

3 Ways to Strengthen Your Cyber Defenses

03/04/2020
By taking proactive action, organizations can face down threats with greater agility and earned confidence.

7 Loyalty Program and Rewards App Attacks

03/04/2020
The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights.

Chinese Nationals Charged with Laundering $100M in Cryptocurrency

03/03/2020
The two defendants allegedly laundered $100 million for the benefit of North Korean threat actors who stole the funds in 2018.

The Cybercrime Pandemic Keeps Spreading

03/03/2020
The World Economic Forum says cyberattacks will be one of the top global business risks over the next 10 years.

How Security Leaders at Starbucks and Microsoft Prepare for Breaches

03/02/2020
Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.