Home Security Threat Intelligence

Threat Intelligence

Threat Intelligence news from the cyber security industry and abroad. Gain insight into cybercrime and advanced persistent threats. Read the latest threat intelligence on malware and other vulnerabilities or malicious programs.

dark reading threat intel and cybersecurity news

Name That Toon: Sight Unseen

Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2021-0324PUBLISHED: 2021-06-14Product: AndroidVersions: Android SoCAndroid ID: A-175402462 CVE-2021-0467PUBLISHED: 2021-06-14 In Chromecast bootROM, there is a possible out of bounds write due to an incorrect bounds check....
dark reading threat intel and cybersecurity news

Intl. Law Enforcement Operation Disrupts Slilpp Marketplace

A seizure warrant affidavit unsealed today states Slilpp had sold allegedly stolen login credentials since 2012.The Justice Department today announced its role in a multinational operation that led officials...
dark reading threat intel and cybersecurity news

McDonald’s Data Breach Exposed Business & Customer Data

An investigation has revealed company data has been breached in the United States, South Korea, and Taiwan.McDonald's has been hit with a data breach in which attackers stole some...
dark reading threat intel and cybersecurity news

Cyber Is the New Cold War & AI Is the Arms Race

Continual cyberattacks have pushed us into a new kind of Cold War, with artificial intelligence the basis of this new arms race.The Internet has enhanced communications, increased commerce, and...
dark reading threat intel and cybersecurity news

Many Mobile Apps Intentionally Using Insecure Connections for Sending Data

A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections.Many mobile...
dark reading threat intel and cybersecurity news

Deepfakes Are on the Rise, but Don’t Panic Just Yet

Deepfakes will likely give way to deep suspicion, as users try to sort legitimate media from malicious. Emerging technologies have been known to cause unwarranted mass hysteria. That said,...
dark reading threat intel and cybersecurity news

Phished Account Credentials Mostly Verified in Hours

Almost two-thirds of all phished credentials are verified by attackers within a day and then used in a variety of schemes, including business email compromise and targeting other users...
dark reading threat intel and cybersecurity news

Ransomware Is Not the Problem

Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems. There's an infinite number of studies of ransomware lately,...
dark reading threat intel and cybersecurity news

CISA Addresses Rise in Ransomware Threatening OT Assets

The agency has released guidance in response to a rise of ransomware attacks affecting OT assets and control systems.The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA)...
dark reading threat intel and cybersecurity news

Required MFA Is Not Sufficient for Strong Security: Report

Attackers and red teams find multiple ways to bypass poorly deployed MFA in enterprise environments, underscoring how redundancy and good design are still required.Multi-factor authentication (MFA) is among the...