Dark Reading: Attacks/Breaches
Critical Vulnerability Hits SAP Enterprise Applications
Tue, 14 Jul 2020 10:30:00 EDT
RECON could allow an unauthenticated attacker to take control of SAP enterprise applications through the web interface.
New Mirai Variant Surfaces with Exploits for 9 Vulnerabilities Products
Tue, 14 Jul 2020 10:00:00 EDT
Impacted products include routers, IP cameras, DVRs, and smart TVs.
Crypto-Primer: Encryption Basics Every Security Pro Should Know
Tue, 14 Jul 2020 10:00:00 EDT
With so many choices for encrypting data and communication, it's important to know the pros and cons of different techniques.
99% of Websites at Risk of Attack Via JavaScript Plug-ins
Tue, 14 Jul 2020 08:10:00 EDT
The average website includes content from 32 different third-party JavaScript programs, new study finds.
Russian Hacker Convicted for Social Network Hacks
Mon, 13 Jul 2020 16:50:00 EDT
The Russian national was convicted of hacking into accounts at LinkedIn, Dropbox, and Formspring.
Experts Predict Rise of Data Theft in Ransomware Attacks
Mon, 13 Jul 2020 14:15:00 EDT
The most attractive targets for data theft are businesses perceived as most likely to pay to prevent exposure of their information.
Decoding the Verizon DBIR Report: An Insider's Look Beyond the Headlines
Mon, 13 Jul 2020 10:00:00 EDT
To truly understand cybersecurity trends, we must look beyond the headlines and ask more of the data. What you learn might surprise you.
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Fri, 10 Jul 2020 17:40:00 EDT
RSA data reveals a continued shift away from browser-based fraud as attackers target mobile apps.
Zoom Patches Zero-Day Vulnerability in Windows 7
Fri, 10 Jul 2020 11:45:00 EDT
The flaw also affects older versions of the operating system, even if they're fully patched.
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Fri, 10 Jul 2020 10:00:00 EDT
We're continuing to see cybercriminals take advantage of COVID-19, and the extension of Tax Day will be the next technique used in their sophisticated method of attacks.
Using Adversarial Machine Learning, Researchers Look to Foil Facial Recognition
Thu, 09 Jul 2020 18:25:00 EDT
For privacy-seeking users, good news: Computer scientists are finding more ways to thwart facial and image recognition. But there's also bad news: Gains will likely be short-lived.
Huge DDoS Attack Launched Against Cloudflare in Late June
Thu, 09 Jul 2020 17:45:00 EDT
The 754 million packets-per-second peak was part of a four-day attack involving more than 316,000 sending addresses.
Up Close with Evilnum, the APT Group Behind the Malware
Thu, 09 Jul 2020 17:35:00 EDT
The group behind Evilnum malware, which continues to target financial institutions, appears to be testing new techniques.
Omdia Research Launches Page on Dark Reading
Thu, 09 Jul 2020 17:15:00 EDT
Data and insight from a leading cybersecurity research and analysis team will broaden the information available to security professionals and technology vendors.
Pen Testing ROI: How to Communicate the Value of Security Testing
Thu, 09 Jul 2020 10:00:00 EDT
There are many reasons to pen test, but the financial reasons tend to get ignored.
Study Finds 15 Billion Stolen, Exposed Credentials in Criminal Markets
Wed, 08 Jul 2020 17:50:00 EDT
Data is fueling account takeover attacks in a big way, Digital Shadows says.
New Fraud Ring "Bargain Bear" Brings Sophistication to Online Crime
Wed, 08 Jul 2020 17:35:00 EDT
The ring tests the validity of stolen credentials to be used in fraud through an online marketplace.
As More People Return to Travel Sites, So Do Malicious Bots
Wed, 08 Jul 2020 16:55:00 EDT
Attacks against travel-related websites are on the rise as the industry begins to slowly recover from COVID-19, new data shows.
US Charges Kazakhstani Citizen With Hacking Into More Than 300 Orgs
Wed, 08 Jul 2020 16:05:00 EDT
The accused man, and members of his cybercriminal group, allegedly made at least $1.5 million hacking into companies and selling access to systems over the past three years.
How Advanced Attackers Take Aim at Office 365
Wed, 08 Jul 2020 14:50:00 EDT
Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.