Dark Reading

Malware in PyPI Code Shows Supply Chain Risks

Dark Readuing Vulnerability and Threats - Fri, 07/19/2019 - 1:30pm
A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.
Categories: Dark Reading

Europol Head Fears 5G Will Give Criminals an Edge

Dark Reading Threat Intelligence - Fri, 07/19/2019 - 12:10pm
Catherine De Bolle is concerned law enforcement will lose its ability to track criminals with the arrival of 5G networks.
Categories: Dark Reading

Mirai Groups Target Business IoT Devices

Dark Reading Threat Intelligence - Fri, 07/19/2019 - 12:00pm
More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.
Categories: Dark Reading

Mirai Groups Target Business IoT Devices

Dark Reading Attacks and Breaches - Fri, 07/19/2019 - 12:00pm
More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.
Categories: Dark Reading

The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike

Dark Readuing Vulnerability and Threats - Fri, 07/19/2019 - 10:00am
Why apples-to-apples performance tests are the only way to accurately gauge the impact of network security products and solutions.
Categories: Dark Reading

The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike

Dark Reading Attacks and Breaches - Fri, 07/19/2019 - 10:00am
Why apples-to-apples performance tests are the only way to accurately gauge the impact of network security products and solutions.
Categories: Dark Reading

Security Lessons From a New Programming Language

Dark Readuing Vulnerability and Threats - Thu, 07/18/2019 - 6:30pm
A security professional needed a secure language for IoT development. So he wrote his own, applying learned lessons about memory and resources in the process.
Categories: Dark Reading

BitPaymer Ransomware Operators Wage Custom, Targeted Attacks

Dark Reading Attacks and Breaches - Thu, 07/18/2019 - 5:30pm
A new framework is allowing the threat group to compile variants of the malware for each victim, Morphisec says.
Categories: Dark Reading

RDP Bug Takes New Approach to Host Compromise

Dark Reading Threat Intelligence - Thu, 07/18/2019 - 3:50pm
Researchers show how simply connecting to a rogue machine can silently compromise the host.
Categories: Dark Reading

RDP Bug Takes New Approach to Host Compromise

Dark Readuing Vulnerability and Threats - Thu, 07/18/2019 - 3:50pm
Researchers show how simply connecting to a rogue machine can silently compromise the host.
Categories: Dark Reading

Open Source Hacking Tool Grows Up

Dark Reading Attacks and Breaches - Thu, 07/18/2019 - 3:50pm
Koadic toolkit gets upgrades - and a little love from nation-state hackers.
Categories: Dark Reading

RDP Bug Takes New Approach to Host Compromise

Dark Reading Attacks and Breaches - Thu, 07/18/2019 - 3:50pm
Researchers show how simply connecting to a rogue machine can silently compromise the host.
Categories: Dark Reading

8 Legit Tools and Utilities That Cybercriminals Commonly Misuse

Dark Reading Threat Intelligence - Thu, 07/18/2019 - 3:20pm
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.
Categories: Dark Reading

8 Legit Tools and Utilities That Cybercriminals Commonly Misuse

Dark Readuing Vulnerability and Threats - Thu, 07/18/2019 - 3:20pm
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.
Categories: Dark Reading

8 Legit Tools and Utilities That Cybercriminals Commonly Misuse

Dark Reading Attacks and Breaches - Thu, 07/18/2019 - 3:20pm
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.
Categories: Dark Reading

Bulgarian Tax Breach Nets All the Records

Dark Readuing Vulnerability and Threats - Thu, 07/18/2019 - 2:00pm
An attack by a 'wizard hacker' results in leaked records for virtually every Bulgarian taxpayer.
Categories: Dark Reading

Bulgarian Tax Breach Nets All the Records

Dark Reading Attacks and Breaches - Thu, 07/18/2019 - 2:00pm
An attack by a 'wizard hacker' results in leaked records for virtually every Bulgarian taxpayer.
Categories: Dark Reading

How Capture the Flag Competitions Strengthen the Cybersecurity Workforce

Dark Readuing Vulnerability and Threats - Thu, 07/18/2019 - 2:00pm
These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields.
Categories: Dark Reading

How Capture the Flag Competitions Strengthen the Cybersecurity Workforce

Dark Reading Attacks and Breaches - Thu, 07/18/2019 - 2:00pm
These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields.
Categories: Dark Reading

79% of US Consumers Fear Webcams Are Watching

Dark Readuing Vulnerability and Threats - Thu, 07/18/2019 - 10:50am
Widespread privacy concerns have caused 60% of people to cover their laptop webcams - some in creative ways - survey data shows.
Categories: Dark Reading

Pages