Loading...


Internet Security Directory
Dark Reading: Attacks & Breaches

-

Dark Reading: Ransomware Has Evolved, And Its Name Is Doxware

Votes:19 Comments:0
The latest form of malware holds computers hostage and compromises the privacy of conversations, photos, and sensitive files. 1/4/2017 By Chris Ensey In recent years, ransomware has become a gr READ MORE
http://www.darkreading.com/attacks-breaches/ransomware-has-evolved-and...

Dark Reading: Spammers Work Up A Hailstorm

Votes:30 Comments:0
In their constant effort to evade anti-spam filters, spammers have devised a new way to deliver junk mail to your inbox. 12/19/2016 By Jai Vijayan With the best anti-spam systems being able to READ MORE
http://www.darkreading.com/attacks-breaches/spammers-work-up-a-hailsto...

Dark Reading: Relentless DDoS Attack Incidents Raise Alarm For Businesses

Votes:26 Comments:0
Threat actors increasingly using DDoS tactics as a smokescreen to hide other malicious activity, Neustar report shows. 10/4/2016 By Jai Vijayan If there's one thing consistent about DDoS attack READ MORE
http://www.darkreading.com/attacks-breaches/relentless-ddos-attack-inc...

Dark Reading: Education Now Suffers The Most Ransomware Attacks

Votes:13 Comments:0
New data shows ransomware rates worldwide doubling and tripling in past 12 months. 9/21/2016 By Kelly Jackson Higgins When you think ransomware victim, most likely your first thought is a hospi READ MORE
http://www.darkreading.com/attacks-breaches/education-now-suffers-the-...

Dark Reading: Hit-And-Run Tactics Fuel Growth In DDoS Attacks

Votes:31 Comments:0
A majority of organizations in Imperva DDoS study suffer multiple consecutive attacks. 8/23/2016 By Jai Vijayan Many threat actors behind distributed denial of service (DDoS) attacks against en READ MORE
http://www.darkreading.com/attacks-breaches/hit-and-run-tactics-fuel-g...

Dark Reading: Large Botnet Comes Back To Life -- With More Malware

Votes:26 Comments:0
The Necurs botnet associated with Dridex and Locky is back after three-week haitus. 6/23/2016 By Jai Vijayan A botnet associated with the huge volumes of Dridex and Locky-laden emails in recent READ MORE
http://www.darkreading.com/attacks-breaches/large-botnet-comes-back-to...

Dark Reading: Ransomware Now Comes With Live Chat Support

Votes:6 Comments:0
Victims of a new version of Jigsaw now have access to live chat operators to help them through the ransom payment process, Trend Micro says. 6/10/2016 By Jai Vijayan Getting hit by ransomware i READ MORE
http://www.darkreading.com/attacks-breaches/ransomware-now-comes-with-...

Dark Reading: 2015: The Year Of 'Attacks on Trust'

Votes:27 Comments:0
Nine attacks that leveraged stolen, compromised, or unprotected cryptographic keys and digital certificates show how easy it is for cybercriminals to bypass security controls and hide their actions. READ MORE
http://www.darkreading.com/attacks-breaches/2015-the-year-of-attacks-o...

Dark Reading: 15 Cybersecurity Lessons We Should Have Learned From 2015, But Pro...

Votes:24 Comments:0
Another infosec year is almost in the books. What did all the breaches, vulnerabilities, trends, and controversies teach us? 12/28/2015 By Sara Peters As is the case every year in the cybersecu READ MORE
http://www.darkreading.com/attacks-breaches/15-cybersecurity-lessons-w...

Dark Reading: Deceit As A Defense Against Cyberattacks

Votes:18 Comments:0
A new generation of 'threat deception' technology takes the honeypot to a new, enterprise level. 10/1/2015 By Kelly Jackson Higgins It's not technically hacking back, but it's definitely a more READ MORE
http://www.darkreading.com/attacks-breaches/deceit-as-a-defense-agains...

Dark Reading: 4 Unsolved Mysteries About Duqu 2.0

Votes:11 Comments:0
Several key questions remain surrounding the nation-state attack targeting intel at Kaspersky Lab, international participants at the Iranian nuclear negotiations, and other organizations. 6/11/2015 READ MORE
http://www.darkreading.com/attacks-breaches/4-unsolved-mysteries-about...

Dark Reading: Hackers Breaking New Ground With Ransomware

Votes:38 Comments:0
The tools and tactics being used to go after victims reveal growing sophistication, and gamers need to look out, security researchers say. 3/13/2015 By Jai Vijayan The enormous success which ha READ MORE
http://www.darkreading.com/attacks-breaches/hackers-breaking-new-groun...

Dark Reading: Long-Running Cyberattacks Become The Norm

Votes:12 Comments:0
Many companies are so focused on the perimeter that they have little idea what's going on inside the network. 1/2/2015 By Jai Vijayan One thing that the depressing string of data breaches this READ MORE
http://www.darkreading.com/attacks-breaches/long-running-cyberattacks-...

Dark Reading: Expired Antivirus Software No. 1 Cause Of Unprotected Windows 8 PC...

Votes:37 Comments:0
New data from Microsoft shows that nearly 10% of Windows 8 users are running expired AV software on their systems, making them four times more likely to get infected. 11/13/2014 By Jai Vijayan READ MORE
http://www.darkreading.com/attacks-breaches/expired-antivirus-software...

Dark Reading: POS Malware Continues To Evolve

Votes:15 Comments:0
New report out today details three prevalent families. 11/11/2014 By Ericka Chickowski With a little over two weeks until the holiday shopping season kicks off in earnest, a picture of the evol READ MORE
http://www.darkreading.com/attacks-breaches/pos-malware-continues-to-e...

Dark Reading: Stuxnet 'Patient Zero' Attack Targets Revealed

Votes:39 Comments:0
Researchers name five Iranian industrial control systems companies attacked in 2009-2010, and they question whether USB sticks were really the method of infection. 11/11/2014 By Sara Peters Res READ MORE
http://www.darkreading.com/stuxnet-patient-zero-attack-targets-reveale...

Dark Reading: From Malware To Breach

Votes:26 Comments:0
New report maps attack behavior after the initial exploit gets dropped on a machine in a victim organization. 11/6/2014 By Kelly Jackson Higgins Got malware? More than likely you do, but don't READ MORE
http://www.darkreading.com/attacks-breaches/from-malware-to-breach/d/d...

Dark Reading: Backoff PoS Malware Boomed In Q3

Votes:39 Comments:0
The security firm Damballa detected a 57% increase in infections of the notorious Backoff malware from August to September. 10/24/2014 By Brian Prince Try as they might, retailers don't seem to READ MORE
http://www.darkreading.com/attacks-breaches/backoff-pos-malware-boomed...

Dark Reading: Stuxnet Exploits Still Alive & Well

Votes:37 Comments:0
Exploits continue abusing a four-year-old bug used in the Stuxnet attack, Kaspersky Lab says. 8/14/2014 By Kelly Jackson Higgins One of the main vulnerabilities used in the infamous Stuxnet att READ MORE
http://www.darkreading.com/attacks-breaches/stuxnet-exploits-still-ali...

Dark Reading: Ram Scraper Malware: Why PCI DSS Can't Fix Retail

Votes:17 Comments:0
There is a gaping hole in the pre-eminent industry security standard aimed at protecting customers, credit card and personal data 7/23/2014 By Brian Riley Target, Neiman Marcus, Michael's, and READ MORE
http://www.darkreading.com/attacks-breaches/ram-scraper-malware-why-pc...

Dark Reading: Stop Targeted Attackers

Votes:30 Comments:0
All cyber-attackers aren't equal. Focus more attention on exploits made just for you By Ericka Chickowski March 20, 2014 Not so long ago, the main threats in cyber-security were random: viruses READ MORE
http://www.darkreading.com/attacks-breaches/stop-targeted-attackers/24...

Dark Reading: Point-Of-Sale System Attack Campaign Hits More Than 40 Retailers

Votes:40 Comments:0
Tor-camouflaged 'ChewBacca' payment card-stealing Trojan doesn't appear to be related to Target, RSA researchers say By Kelly Jackson Higgins January 30, 2014 Another day, another point-of-sale READ MORE
http://www.darkreading.com/attacks-breaches/point-of-sale-system-attac...

Dark Reading: Tech Insight: Defending Point-Of-Sale Systems

Votes:4 Comments:0
US-CERT publishes advice on defending POS systems against attacks like those against Target, Neiman Marcus By John H. Sawyer January 24, 2014 Major hacks at retailers that include Target and Ne READ MORE
http://www.darkreading.com/attacks-breaches/tech-insight-defending-poi...

Dark Reading: 'Mystery' Malware Files Often Missed In Cleanup

Votes:33 Comments:0
Some malware infections leave stealthy beachhead files behind after the main malware is detected and removed By Kelly Jackson Higgins December 10, 2013 The newly disrupted ZeroAccess botnet was READ MORE
http://www.darkreading.com/attacks-breaches/mystery-malware-files-ofte...

Dark Reading: Businesses Suffer An Average Of 9 Targeted Attacks Per Year

Votes:9 Comments:0
New study reveals breadth -- and apparent success -- of the typical advanced persistent threat (APT)-type attack By Kelly Jackson Higgins December 03, 2013 Advanced persistent threat (APT)-styl READ MORE
http://www.darkreading.com/attacks-breaches/businesses-suffer-an-avera...

Dark Reading: Stuxnet's Earlier Version Much More Powerful And Dangerous, New An...

Votes:21 Comments:0
ICS/SCADA expert Ralph Langner analyzes how Stuxnet shifted from super-stealthy to simpler, and dispels common misconceptions about the infamous Stuxnet attack on Iran's nuclear facility -- including READ MORE
http://www.darkreading.com/attacks-breaches/stuxnets-earlier-version-m...

Dark Reading: Chinese APT Campaigns May Be More Connected Than Previously Though...

Votes:22 Comments:0
Researchers discover malware 'arms dealer' layer that supports multiple cyberespionage attacks By Kelly Jackson Higgins November 12, 2013 Chinese cyberespionage actors have been discovered shar READ MORE
http://www.darkreading.com/attacks-breaches/chinese-apt-campaigns-may-...

Dark Reading: Distributing Malware Through Future App Stores

Votes:22 Comments:0
Difficult times ahead for app markets as professional malware developers ramp their evasion techniques By Gunter Ollmann October 07, 2013 As corporate networks continue to succumb to the bleati READ MORE
http://www.darkreading.com/attacks-breaches/distributing-malware-throu...

Dark Reading: 5 Lessons From Real-World Attacks

Votes:9 Comments:0
Tales from the trenches show that even small organizations are in the bull's eye By Kelly Jackson Higgins October 03, 2013 INTEROP -- New York City -- Take it from Harry Sverdlove, CTO of secur READ MORE
http://www.darkreading.com/attacks-breaches/5-lessons-from-real-world-...

Dark Reading: Rise Of The 'Hit-And-Run' APT

Votes:31 Comments:0
A new model of cyberespionage is emerging that relies on cybermercenaries hired to break in, steal information, and then leave -- with specific targeted information By Kelly Jackson Higgins Septem READ MORE
http://www.darkreading.com/attacks-breaches/rise-of-the-hit-and-run-ap...

Dark Reading: The Changing Face Of Advanced Persistent Threats

Votes:8 Comments:0
APTs and targeted attacks are becoming more mainstream. Is your enterprise ready? By Robert Lemos August 19, 2013 Earlier this year, a small aerospace company asked AccessData, a forensics and READ MORE
http://www.darkreading.com/attacks-breaches/the-changing-face-of-advan...

Dark Reading: The Increasing Failure Of Malware Sandboxing

Votes:12 Comments:0
Virtualization limits of sandboxes impede threat detection By Gunter Ollmann August 14, 2013 The past three years have seen many organizations adopt and deploy in-house dynamic sandboxing techn READ MORE
http://www.darkreading.com/attacks-breaches/the-increasing-failure-of-...

Dark Reading: 'Hangover' Persists, More Mac Malware Found

Votes:7 Comments:0
Attackers behind the Operation Hangover cyberspying campaign out of India found dropping OS X malware, covering their tracks online By Kelly Jackson Higgins July 18, 2013 Researchers who this s READ MORE
http://www.darkreading.com/attacks-breaches/hangover-persists-more-mac...

Dark Reading: Free 'Active Defense' Tools Emerge

Votes:18 Comments:0
Ammunition for fighting back against cyberattackers in subtle yet disruptive ways is becoming available in open source By Kelly Jackson Higgins July 11, 2013 A wave of open-source tools for tur READ MORE
http://www.darkreading.com/attacks-breaches/free-active-defense-tools-...

Dark Reading: NSA Leak Ushers In New Era Of The Insider Threat

Votes:28 Comments:0
A determined user or contractor hell-bent on leaking data can't be stopped, but businesses should revisit their user access policies and protections By Kelly Jackson Higgins June 12, 2013 If th READ MORE
http://www.darkreading.com/attacks-breaches/nsa-leak-ushers-in-new-era...

Dark Reading: The Network And The Malware

Votes:16 Comments:0
This is the first installment of a two-part series in which Mike Rothman and Wendy Nather will tackle how to use the network for detection, monitoring, and forensics of advanced malware By Mike Rot READ MORE
http://www.darkreading.com/attacks-breaches/the-network-and-the-malwar...

Dark Reading: Chinese Cyberespionage: Brazen, Prolific, And Persistent

Votes:29 Comments:0
New research from multiple sources illustrates dominant role of China in cyberespionage By Kelly Jackson Higgins April 30, 2013 China, China, China: New data and intelligence is shedding more l READ MORE
http://www.darkreading.com/attacks-breaches/chinese-cyberespionage-bra...

Dark Reading: Security Vendors In The Aftermath Of Targeted Attacks

Votes:40 Comments:0
RSA, Microsoft, and Bit9 executives share insights on how the high-profile targeted breaches they suffered have shaped things By Kelly Jackson Higgins April 24, 2013 It has been months now sinc READ MORE
http://www.darkreading.com/attacks-breaches/security-vendors-in-the-af...

Dark Reading: Botnet Business Booming

Votes:4 Comments:0
Some dismantled botnets rank in the top ten most prevalent as old bot malware gets repurposed, according to new Fortinet report Mar 19, 2013 By Kelly Jackson Higgins If there's one thing we've READ MORE
http://www.darkreading.com/attacks-breaches/botnet-business-booming/d/...

Dark Reading: Stuxnet's Earlier Version Much More Powerful And Dangerous, New An...

Votes:10 Comments:0
ICS/SCADA expert Ralph Langner analyzes how Stuxnet shifted from super-stealthy to simpler, and dispels common misconceptions about the infamous Stuxnet attack on Iran's nuclear facility -- including READ MORE
http://www.darkreading.com/attacks-breaches/stuxnets-earlier-version-m...

Dark Reading: How To Detect Zero-Day Malware And Limit Its Impact

Votes:25 Comments:0
An increasing percentage of malware has never been seen before. Here are some tips for stopping it Nov 08, 2012 [Excerpted from "How to Detect Zero-Day Malware and Limit Its Impact," a new, free READ MORE
http://www.darkreading.com/attacks-breaches/how-to-detect-zero-day-mal...

Dark Reading: Scope Of APTs More Widespread Than Thought

Votes:24 Comments:0
Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage Aug 02, 2012 By Kelly Jackson Higgins T READ MORE
http://www.darkreading.com/attacks-breaches/scope-of-apts-more-widespr...

Dark Reading: Madi Malware: Advanced Persistent Threat Or Just A Threat?

Votes:28 Comments:0
Security researchers are calling Madi an example of an advanced persistent threat, but what makes an APT an APT? Jul 19, 2012 By Brian Prince Earlier this week, security researchers at Kaspersk READ MORE
http://www.darkreading.com/attacks-breaches/madi-malware--advanced-per...

Dark Reading: Stuxnet, Duqu, Flame Targeted Illegal Windows Systems In Iran

Votes:27 Comments:0
Pirated software the norm in the region Jun 19, 2012 By Kelly Jackson Higgins An oft-overlooked detail about Stuxnet, Duqu, and Flame is that the attacks all targeted Windows machines in Iran e READ MORE
http://www.darkreading.com/attacks-breaches/stuxnet-duqu-flame-targete...

Dark Reading: 'Conclusive' Link Found Between Stuxnet And Flame

Votes:15 Comments:0
Researchers say Flame predates Stuxnet and shares some source code with first-generation version of Stuxnet Jun 11, 2012 By Kelly Jackson Higgins A new twist in the mystery that is Stuxnet/Duqu READ MORE
http://www.darkreading.com/attacks-breaches/conclusive-link-found-betw...

Dark Reading: How Flame Hid In Plain Sight For Years

Votes:7 Comments:0
Easy-to-crack encryption likely helped keep Flame alive, as well as its resemblance to conventional software May 31, 2012 By Kelly Jackson Higgins One of the most striking aspects about the new READ MORE
http://www.darkreading.com/attacks-breaches/how-flame-hid-in-plain-sig...

Dark Reading: 'Flame' Fans Notion Of More Weapons Yet To Be Found

Votes:25 Comments:0
Targeted attack looks a lot like conventional spyware, but with some major twists -- and questions about links to Stuxnet, Duqu May 29, 2012 By Kelly Jackson Higgins It's big -- 20 times the si READ MORE
http://www.darkreading.com/attacks-breaches/flame-fans-notion-of-more-...

Dark Reading: Advanced Attacks Call For New Defenses

Votes:18 Comments:0
With conventional wisdom now that 'advanced attacks happen,' has the time come to create the next-generation sandbox or other containment method? Apr 30, 2012 By Kelly Jackson Higgins This is t READ MORE
http://www.darkreading.com/attacks-breaches/advanced-attacks-call-for-...

Dark Reading: Malware Mania: Badware And Botnets Explode

Votes:11 Comments:0
McAfee's new threat report for Q1 shows bots and PC and mobile malware on the rise May 24, 2012 By Kelly Jackson Higgins Malware was on roll during the first quarter of this year as the number READ MORE
http://www.darkreading.com/attacks-breaches/malware-mania-badware-and-...

Dark Reading: How To Detect And Root Out Sophisticated Malware

Votes:16 Comments:0
New report offers insights on excising that hard-to-detect malware May 24, 2012 By John H. Sawyer [Excerpted from "Rooting Out Sophisticated Malware," a new report posted this week on Dark Read READ MORE
http://www.darkreading.com/attacks-breaches/how-to-detect-and-root-out...

Dark Reading: Hunting Botnets In The Cloud

Votes:29 Comments:0
Combining cloud, crowdsourcing, and big data to find and quash botnets on a larger scale Nov 07, 2012 By Kelly Jackson Higgins Comparing botnet command-and-control (C&C) traffic or malware with READ MORE
http://www.darkreading.com/attacks-breaches/hunting-botnets-in-the-clo...

Dark Reading: APT-Type Attack A Moving Target

Votes:7 Comments:0
Malware just a small piece of the puzzle in advanced attacks, and traditional cybercriminals are also getting more 'persistent' Mar 13, 2012 By Kelly Jackson Higgins Targeted attacks are evolvi READ MORE
http://www.darkreading.com/attacks-breaches/apt-type-attack-a-moving-t...

Dark Reading: Damage Mitigation As The New Defense

Votes:31 Comments:0
Containing the attacker in today's persistent threat environment Apr 05, 2012 By Kelly Jackson Higgins This is the second installment in an occasional series on security's new reality. Any D READ MORE
http://www.darkreading.com/attacks-breaches/damage-mitigation-as-the-n...

Dark Reading: How To Detect And Defend Against Advanced Persistent Threats

Votes:18 Comments:0
There are no silver bullets for APTs, but there are steps your organization can take. Here's a look at what you can do Mar 16, 2012 By Michael Cobb [Excerpted from "Detecting and Defending Agai READ MORE
http://www.darkreading.com/attacks-breaches/how-to-detect-and-defend-a...

Dark Reading: Security's New Reality: Assume The Worst

Votes:4 Comments:0
A more fatalistic view that attackers have already infiltrated the organization presents a different way of looking at -- and marketing -- security Mar 15, 2012 By Kelly Jackson Higgins First i READ MORE
http://www.darkreading.com/attacks-breaches/securitys-new-reality-assu...

Dark Reading: Smarter, Stealthier, Sneakier Malware

Votes:26 Comments:0
From Stuxnet to Duqu to new incarnations of Zeus, sophisticated attacks are becoming more numerous -- and harder to stop Feb 08, 2012 By Tim Wilson Stuxnet. Duqu. Advanced persistent threats. E READ MORE
http://www.darkreading.com/attacks-breaches/smarter-stealthier-sneakie...

Dark Reading: Why Small Businesses Are Vulnerable To Cybercrime -- And What They...

Votes:5 Comments:0
SMBs have more valuable data than consumers and fewer defenses than large enterprises. Have they become the sweet spot for the bad guys? Jun 14, 2011 By Neil Roiter [Excerpted from "Small Busin READ MORE
http://www.darkreading.com/attacks-breaches/why-small-businesses-are-v...

Dark Reading: Verizon Data Breach Report: Bad Guys Target Low-Hanging Fruit

Votes:4 Comments:0
Cybercriminals steering away from big caches of data, using simpler tactics to crack smaller enterprises Apr 19, 2011 By Tim Wilson Cybercriminals are making a leap from the big score to easy m READ MORE
http://www.darkreading.com/attacks-breaches/verizon-data-breach-report...

Dark Reading: An Advanced Persistent Threat Reality Check

Votes:4 Comments:0
Prevention is often futile, so how you manage the aftermath of discovering an intrusion can make all the difference in proper remediation Jan 27, 2011 By Kelly Jackson Higgins Most victims of t READ MORE
http://www.darkreading.com/attacks-breaches/an-advanced-persistent-thr...

Dark Reading: Crimeware Toolkits Driving Most Online Malware

Votes:28 Comments:0
Symantec report connects the dots in rise in malware and easy-to-use crimeware kits Jan 20, 2011 By Kelly Jackson Higgins DIY crimeware kits are all the rage -- more than 60 percent of maliciou READ MORE
http://www.darkreading.com/attacks-breaches/crimeware-toolkits-driving...

Dark Reading: Stuxnet: How It Happened And How Your Enterprise Can Avoid Similar...

Votes:24 Comments:0
A look back at one of the industry's most complex attacks -- and the lessons it teaches May 17, 2011 By Michael Davis [Excerpted from "Stuxnet Reality Check: Are You Prepared For A Similar Atta READ MORE
http://www.darkreading.com/attacks-and-breaches/stuxnet-how-it-happene...

Dark Reading: The Curious Case Of Unpatchable Vulnerabilities

Votes:37 Comments:0
Verizon's annual breach investigations reports have consistently shown that fewer -- and in the most recent edition, only five of 381 -- attacks exploit vulnerabilities that could have been patched. S READ MORE
http://www.darkreading.com/the-curious-case-of-unpatchable-vulnerabili...

Dark Reading: Five Security Tools Every Small Business Must Have

Votes:25 Comments:0
Small businesses often are short on security skills, staffing and budget. Here are five tools that can help Jan 08, 2013 By Michael Cobb Excerpted from "Five Security Tools Every Small Business READ MORE
http://www.darkreading.com/attacks-breaches/five-security-tools-every-...

Dark Reading: Microsoft Studies 10 Years Of Malware And Threats

Votes:12 Comments:0
Special report maps malware evolution, and how the least-infected regions keep botnets, other threats at bay Mar 05, 2012 By Kelly Jackson Higgins RSA CONFERENCE 2012 -- San Francisco, Calif. - READ MORE
http://www.darkreading.com/attacks-breaches/microsoft-studies-10-years...
Dark Reading attacks and breaches articles
Internet Marketing in Tennessee , Internet Marketing in Connecticut
-
Search
Search
Search
Search
Login
Privacy Policy