Dark Reading: Attacks/Breaches
Digital Distancing with Microsegmentation
Fri, 29 May 2020 10:00:00 EDT
Physical distancing has blunted a virus's impact; the same idea can be applied to computers and networks to minimize breaches, attacks, and infections.
All Links Are Safe ... Right?
Fri, 29 May 2020 09:40:00 EDT
Today is a perfect day for a security breach.
A Rogues' Gallery of MacOS Malware
Thu, 28 May 2020 19:00:00 EDT
MacOS isn't immune from malware. Being prepared means understanding the nature of the worst threats a security team is likely to see attacking Macs in the enterprise.
GitHub Supply Chain Attack Uses Octopus Scanner Malware
Thu, 28 May 2020 17:25:00 EDT
Octopus Scanner is a new malware used to compromise 26 open source projects in a massive GitHub supply chain attack.
Researchers ID Hacktivist Who Defaced Nearly 5,000 Websites
Thu, 28 May 2020 17:10:00 EDT
Opsec mistakes lead a Check Point researcher to an individual in Brazil who was behind a longtime hacking campaign.
Valak Malware Retasked to Steal Data from US, German Firms
Thu, 28 May 2020 16:50:00 EDT
Once considered a loader for other malware, Valak regularly conducts reconnaissance and steals information and credentials, new analysis shows.
NSA Warns Russia's 'Sandworm' Group Is Targeting Email Servers
Thu, 28 May 2020 14:15:00 EDT
The Russian military group has been exploiting a flaw in the Exim mail transfer agent since last August, the NSA reports.
3 SMB Cybersecurity Myths Debunked
Thu, 28 May 2020 14:00:00 EDT
Small and midsize businesses are better at cyber resilience than you might think.
Google, Microsoft Brands Impersonated the Most in Form-Based Attacks
Thu, 28 May 2020 12:15:00 EDT
Attackers are preying on users' inclination to click on familiar-looking websites, but instead trick them into sharing usernames and passwords.
Data Loss Spikes Under COVID-19 Lockdowns
Thu, 28 May 2020 11:20:00 EDT
Two new reports suggest a massive gap between how organizations have prepared their cybersecurity defenses and the reality of their efficacy.
How Elite Protectors Operationalize Security Protection
Thu, 28 May 2020 10:00:00 EDT
There is no silver bullet for cybersecurity. It takes the right people, with the right mindset, applying the right elements of good security from the data center to the SOC.
Netwalker Ransomware Tools Reveal Attacker Tactics and Techniques
Wed, 27 May 2020 20:00:00 EDT
Malware and related files show that ransomware operators don't need a cutting-edge arsenal to be effective.
Stay-at-Home Orders Coincide With Massive DNS Surge
Wed, 27 May 2020 17:15:00 EDT
A variety of sites saw as much as seven times the number of domain requests in late March and early April, suggesting attackers attempted massive denial-of-service attacks.
Security 101: SQL Injection
Wed, 27 May 2020 15:50:00 EDT
A carefully crafted attack can convince a database to reveal all its secrets. Understanding the basics of what the attack looks like and how to protect against it can go a long way toward limiting the threat.
Standing Privilege: The Attacker's Advantage
Wed, 27 May 2020 14:00:00 EDT
The credential is a commodity and will continue to be breached. As a result, focus and spending must shift toward the access that the credentials provide.
Microsoft Shares PonyFinal Threat Data, Warns of Delivery Tactics
Wed, 27 May 2020 12:05:00 EDT
PonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.
What the World's Elite Protectors Teach Us about Cybersecurity
Wed, 27 May 2020 10:00:00 EDT
How to protect anyone and anything, from the perspective of a career Secret Service agent and former special operations marine.
6 Steps Consumers Should Take Following a Hack
Wed, 27 May 2020 09:30:00 EDT
Without the luxury of an IT security team to help them after a breach or credit card compromise, consumers will want to keep these tips in mind.
StrandHogg 2.0 Emerges as 'Evil Twin' to Android Threat
Tue, 26 May 2020 17:25:00 EDT
The vulnerability, which exists in almost every version of Android, is both more dangerous and harder to detect than its predecessor.
How to Pay a Ransom: A Step-By-Step Guide for Something You'd Never Do
Tue, 26 May 2020 16:00:00 EDT
Even prior to the COVID-19 pandemic, ransomware attacks were on the rise and becoming more expensive. Now your, um, friend's organization has fallen victim and is going to pay. Here's how they should handle it.