Editor's Pick

Buffer Overflow to Run Root Shell - Full Tutorial

Buffer Overflow Basics Overview Buffer overflows were an earth-shattering vulnerability exploited in the late 1980’s that are protected against on modern systems. That said, they are still relevant, and pave the way to learning more advanced e...

Latest news

80% of Net Neutrality Comments to FCC Were Fudged

NY's AG: Millions of fake comments – in favor and against – came from a secret broadband-funded campaign or from a 19-year-old's fake identities.

Threatpost | 6 minutes ago
Investment Scammer John Davies Reinvents Himself?

John Bernard, a pseudonym used by a convicted thief and con artist named John Clifton Davies who’s fleeced dozens of technology startups out of an ...

Krebs on Security | 48 minutes ago
11 Reasons Why You Sorta Love Passwords

We asked you to tell the truth about why you secretly love passwords. From the heartfelt to the hilarious, here's what you had to say.

Dark Reading | an hour ago
Black Hat Asia Speakers Share Secrets About Sandboxes, Smart Doors, and Security

Find video interviews with some of the coolest Black Hat Asia experts right here, as part of the Dark Reading News Desk this week.

Dark Reading | an hour ago
Troy Hunt: Organizations Make Security Choices Tough for Users

The Have I Been Pwned founder took the virtual stage at Black Hat Asia to share stories about his work and industrywide challenges.

Dark Reading | 15 hours ago
New Techniques Emerge for Abusing Windows Services to Gain System Control

Organizations should apply principles of least privilege to mitigate threats, security researcher says.

Dark Reading | 16 hours ago
Google Plans to Automatically Enable Two-Factor Authentication

The company plans to automatically enroll users in two-step verification if their accounts are properly configured.

Dark Reading | 16 hours ago
Qualcomm Chip Bug Opens Android Fans to Eavesdropping

A malicious app can exploit the issue, which could affect up to 30 percent of Android phones.

Threatpost | 18 hours ago
CISA Publishes Analysis on New 'FiveHands' Ransomware

Attackers used publicly available tools, FiveHands ransomware, and SombRAT to successfully target an organization, officials report.

Dark Reading | 19 hours ago
Critical Cisco SD-WAN, HyperFlex Bugs Threaten Corporate Networks

The networking giant has rolled out patches for remote code-execution and command-injection security holes that could give attackers keys to the...

Threatpost | 20 hours ago
Ryuk Ransomware Attack Sprung by Frugal Student

The student opted for “free” software packed with a keylogger that grabbed credentials later used by "Totoro" to get into a biomolecular ins...

Threatpost | 20 hours ago
Cloud-Native Businesses Struggle With Security

More companies moved to cloud-native infrastructure in the past year, and security incidents and malware moved right along with them.

Dark Reading | 21 hours ago
Securing the Internet of Things in the Age of Quantum Computing

Internet security, privacy, and authentication aren't new issues, but IoT presents unique security challenges.

Dark Reading | 21 hours ago
Massive DDoS Attack Disrupts Belgium Parliament

A large-scale incident earlier this week against Belnet and other ISPs has sent a wave of internet disruption across numerous Belgian government,...

Threatpost | 22 hours ago
Biden's Supply Chain Initiative Depends on Cybersecurity Insights

Those helming the US supply chain executive order need to leverage standards, measurement, and the lessons cybersecurity leaders have learned.

Dark Reading | a day ago
How to Move Beyond Passwords and Basic MFA

It's not a question of whether passwordless is coming -- it's simply a question of when. How should your organization prepare? (Part two of a...

Dark Reading | a day ago
Attackers Seek New Strategies to Improve Macros' Effectiveness

The ubiquity of Microsoft Office document formats means attackers will continue to use them to spread malware and infect systems.

Dark Reading | a day ago
New Crypto-Stealer ‘Panda’ Spread via Discord

PandaStealer is delivered in rigged Excel files masquerading as business quotes, bent on stealing victims' cryptocurrency and other info.

Threatpost | a day ago
Anti-Spam WordPress Plugin Could Expose Website User Data

'Spam protection, AntiSpam, FireWall by CleanTalk' is installed on more than 100,000 sites -- and could offer up sensitive info to attackers that...

Threatpost | a day ago
Gap Between Security and Networking Teams May Hinder Tech Projects

Professionals in each field describe a poor working relationship between the two teams

Dark Reading | a day ago
DoD Lets Researchers Target All Publicly Accessible Info Systems

The Department of Defense expands its vulnerability disclosure program to include a broad range of new targets.

Dark Reading | a day ago
Wanted: The (Elusive) Cybersecurity 'All-Star'

Separate workforce studies by (ISC) 2 and ISACA point to the need for security departments to work with existing staff to identify needs and bring...

Dark Reading | a day ago
Debating Law Enforcement's Role in the Fight Against Cybercrime

The FBI's action to remove Web shells from compromised Microsoft Exchange Servers sparks a broader discussion about officials' response to...

Dark Reading | a day ago
Raft of Exim Security Holes Allow Linux Mail Server Takeovers

Remote code execution, privilege escalation to root and lateral movement through a victim's environment are all on offer for the unpatched or unaware.

Threatpost | a day ago

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.

Dismiss