Dark Reading

MITRE Evaluates Tools for APT Detection

03/29/2018
A new service from MITRE will evaluate products based on how well they detect advanced persistent threats.

Deconstructing the DOJ Iranian Hacking Indictment

03/29/2018
The alleged attackers used fairly simple tools, techniques and procedures to compromise a new victim organization on an almost weekly basis for over five years.

WannaCry Re-emerges at Boeing

03/29/2018
Computers at the aerospace giant were hit by the WannaCry malware but systems are back to normal

FBI IC3: Tech Support Scam Losses Rose 86% in 2017

03/29/2018
Most victims are in the US, but FBI IC3 has logged cases from 85 different countries.

University Networks Become Fertile Ground for Cryptomining

03/29/2018
Sixty percent of cryptomining detections in a Vectra study occurred on higher-education networks.

US Election Swing States Score Low Marks in Cybersecurity

03/29/2018
C and D grades for Florida, Michigan, New Hampshire, Nevada, and Ohio, SecurityScorecard assessment shows.

Deconstructing a Business Email Compromise Attack

03/29/2018
How a tech-savvy New Jersey couple outwitted a German hacker group and saved their home and life savings.

New Android Cryptojacker Can Brick Phones

03/28/2018
Mobile cryptojacking malware mines Monero.

Destructive and False Flag Cyberattacks to Escalate

03/28/2018
Rising geopolitical tensions between the US and Russia, Iran, and others are the perfect recipe for nastier nation-state cyberattacks.

Baltimore Hit with Hack on 911 System

03/28/2018
An attack took down part of Baltimore's 911 system for 17 hours over the weekend, and details are still in short supply.

How Measuring Security for Risk & ROI Can Empower CISOs

03/28/2018
For the vast majority of business decisions, organizations seek metrics-driven proof. Why is cybersecurity the exception?

Fixing Hacks Has Deadly Impact on Hospitals

03/28/2018
A study from Vanderbilt University shows that remediating data breaches has a very real impact on mortality rates at hospitals.

Automating Ethics for Cybersecurity

03/28/2018
Having a code of ethics and enforcing it are two different things.

Kaspersky Lab Open-Sources its Threat-Hunting Tool

03/28/2018
'KLara' was built to speed up and automate the process of identifying malware samples.

Getting Ahead of Internet of Things Security in the Enterprise

03/28/2018
In anticipation of an IoT-centric future, CISOs must be rigorous in shoring up defenses that provide real-time insights across all network access points.

UVA Defeats UMBC, in Stunning Upset

03/27/2018
In first trip to Mid-Atlantic Collegiate Cyber Defense Competition, University of Virginia's Cyber Defense Team defeats reigning national champs from University of Maryland, Baltimore County.

Report Shows Ransomware is the New Normal

03/27/2018
A new report on malware says that the majority of companies globally have been victims of ransomware in the last 12 months.

Attackers Shift From Adobe Flaws to Microsoft Products

03/27/2018
Seven of the Top 10 most commonly exploited vulnerabilities in 2017 were Microsoft-related - not Adobe Flash as in years past, Recorded Future found.

780 Days in the Life of a Computer Worm

03/27/2018
This is a story of a worm, from the time it was coded and deployed onto the Internet. It is narrated by the worm in the first person.

Grossman, 'RSnake' Launch Website Asset Inventory Startup

03/27/2018
Bit Discovery gets $2.7 million in seed-round funding; Alex Stamos, Jeff Moss among the investors.