Dark Reading

Microsoft Report Details Different Forms of Cryptominers

03/13/2018
A new report explores different ways legitimate and malicious coin miners are appearing in the enterprise.

Microsoft Patch Tuesday: Prioritize Browser Updates

03/13/2018
All of the critical vulnerabilities Microsoft patched on March 13 were within, and related to, browsers.

AMD Investigating Report of Vulnerabilities in its Microprocessors

03/13/2018
Israel-based firm says it found critical bugs in AMD's newest chip families.

What CISOs Should Know About Quantum Computing

03/13/2018
As quantum computing approaches real-world viability, it also poses a huge threat to today's encryption measures.

Google 'Distrust Dates' Are Coming Fast

03/13/2018
All the tools are in place for the migration of SSL digital certificates on a scale that is unprecedented for the certificate authority industry. Are you ready?

Microsoft Remote Access Protocol Flaw Affects All Windows Machines

03/13/2018
Attackers can exploit newly discovered critical crypto bug in CredSSP via a man-in-the-middle attack and then move laterally within a victim network.

What's the C-Suite Doing About Mobile Security?

03/13/2018
While most companies have security infrastructure for on-premises servers, networks, and endpoints, too many are ignoring mobile security. They'd better get moving.

Malware 'Cocktails' Raise Attack Risk

03/13/2018
Malware mash-ups hiding in encrypted traffic are boosting attack numbers and increasing the danger to data, according to recent reports.

Asia's Security Leaders Feel Underprepared for Future Threats: Report

03/12/2018
A new study highlights major concerns of cybersecurity leaders in Asia, where most fear critical infrastructure attacks, advanced threats, and social engineering.

Malware Leveraging PowerShell Grew 432% in 2017

03/12/2018
Cryptocurrency mining and ransomware were other major threats.

Chinese APT Backdoor Found in CCleaner Supply Chain Attack

03/12/2018
Avast discovers ShadowPad tool for use in apparent planned third stage of the targeted attack campaign.

FlawedAmmyy RAT Campaign Puts New Spin on Old Threat

03/12/2018
A remote access Trojan, in use since 2016, has a new tactic: combining zip files with the SMB protocol to infect target systems.

Disappearing Act: Dark Reading Caption Contest Winners

03/12/2018
A standout field with hysterical puns about security policies, Meltdown, Amazon Web Services, and the right to be forgotten. And the winner is ...

Georgia Man Pleads Guilty to Business Email Compromise Attacks

03/12/2018
Kerby Rigaud has pleaded guilty to using BEC attacks in attempts to steal more than $1 million from US businesses.

CyberArk Buys Vaultive for Privileged Account Security Technology

03/12/2018
The account security firm will use Vaultive's tech to protect privileged users at heightened risk for cyberattacks.

IoT Product Safety: If It Appears Too Good to Be True, It Probably Is

03/12/2018
Proposed new connected-product repair laws will provide hackers with more tools to make our lives less secure.

What Happens When You Hold Robots for Ransom?

03/10/2018
Researchers explore why an attacker would target robots with ransomware, and the implications of what might happen if they did.

Microsoft Windows Defender Prevents 400,000 Dofoil Infections

03/09/2018
Improved anti-malware detection prevented spread of cryptomining software this week, says Microsoft.

China's Vulnerability Database Altered to Hide Govt. Influence

03/09/2018
Recorded Future says move designed to hide fact that CNNVD routinely delays publication of high-risk flaws so government can assess them for offensive use.

'Slingshot' Cyber Espionage Campaign Hacks Network Routers

03/09/2018
Advanced hacking group appears to be native English speakers targeting Africa, Middle East.