Editor's Pick

Buffer Overflow to Run Root Shell - Full Tutorial

Buffer Overflow Basics Overview Buffer overflows were an earth-shattering vulnerability exploited in the late 1980’s that are protected against on modern systems. That said, they are still relevant, and pave the way to learning more advanced e...

Latest news

Thycotic & Centrify Merge to Form Cloud Identity Security Firm

The combined entity will expand on both companies' privileged access management tools and expects to debut a new brand this year.

Dark Reading | 15 hours ago
Security Bug Allows Attackers to Brick Kubernetes Clusters

The vulnerability is triggered when a cloud container pulls a malicious image from a registry.

Threatpost | 15 hours ago
CISA Urges Caution for Security Researchers Targeted in Attack Campaign

The agency urges researchers to take precautions amid an ongoing targeted threat campaign.

Dark Reading | 15 hours ago
Ransomware Attack Creates Cheese Shortages in Netherlands

Not a Gouda situation: An attack on a logistics firm is suspected to be related to Microsoft Exchange server flaw.

Threatpost | 16 hours ago
FBI Operation Remotely Removes Web Shells From Exchange Servers

A court order authorized the FBI to remove malicious Web shells from hundreds of vulnerable machines running on-premises Exchange Server.

Dark Reading | 16 hours ago
FBI Clears ProxyLogon Web Shells from Hundreds of Orgs

In a veritable cyber-SWAT action, the Feds remotely removed the infections without warning businesses beforehand.

Threatpost | 18 hours ago
A Post-Data Privacy World and Data-Rights Management

Joseph Carson, chief security scientist at Thycotic, discusses the death of data privacy and what comes next.

Threatpost | 18 hours ago
The CISO Life Is Half as Good

Lora Vaughn was at a crossroads -- and that was before mandated pandemic lockdowns came into play. Here's her story of how life got sweeter after...

Dark Reading | 20 hours ago
100,000 Google Sites Used to Install SolarMarket RAT

Search-engine optimization (SEO) tactics direct users searching for common business forms such as invoices, receipts or other templates to...

Threatpost | 21 hours ago
Bolstering Our Nation's Defenses Against Cybersecurity Attacks

Shawn Henry, former Executive Assistant Director of the FBI and current CrowdStrike president of services and CSO, shares the top three...

Dark Reading | 22 hours ago
Dependency Problems Increase for Open Source Components

The number of components in the average application rose 77% over two years. No wonder, then, that 84% of codebases have at least one vulnerability.

Dark Reading | 22 hours ago
Microsoft Has Busy April Patch Tuesday with Zero-Days, Exchange Fixes

Microsoft fixes 110 vulnerabilities, with 19 classified as critical and another flaw under active attack.

Threatpost | 23 hours ago
DNS Vulnerabilities Expose Millions of Internet-Connected Devices to Attack

Researchers uncover a fresh set of nine vulnerabilities in four TCP/IP stacks that are widely used in everything from powerful servers and...

Dark Reading | a day ago
NSA Alerted Microsoft to New Exchange Server Vulnerabilities

Microsoft today patched 114 CVEs to address the Exchange Server flaws, more than 50 remote code execution vulnerabilities, and one zero-day.

Dark Reading | a day ago
Compromised Microsoft Exchange Server Used to Host Cryptominer

Researchers say an unknown attacker is targeting vulnerable Exchange Servers with a payload hosted on a compromised Exchange Server.

Dark Reading | a day ago
How the NAME:WRECK Bugs Impact Consumers, Businesses

How this class of vulnerabilities will impact millions connected devices and potentially wreck the day of IT security professionals.

Threatpost | a day ago
Global Dwell Time Drops as Ransomware Attacks Accelerate

The length of time attackers remain undiscovered in a target network has fallen to 24 days, researchers report, but ransomware plays a role.

Dark Reading | a day ago
COVID-Related Threats, PowerShell Attacks Lead Malware Surge

Researchers measured 648 new malware threats every minute during Q4 2020.  

Threatpost | a day ago
Dark Reading to Upgrade Site Design, Performance

Improvements will make site content easier to navigate, faster, and more functional.

Dark Reading | a day ago
Tax Phish Swims Past Google Workspace Email Security

Crooks are looking to harvest email credentials with a savvy campaign that uses the Typeform service to host the phishing page.

Threatpost | a day ago
5 Objectives for Establishing an API-First Security Strategy

With APIs predicted to be the most common attack vector by 2022, an API-first security strategy is critical now more than ever.

Dark Reading | a day ago
Adobe Patches Slew of Critical Security Bugs in Bridge, Photoshop

The security bugs could open the door for arbitrary code-execution and full takeover of targeted machines.

Threatpost | a day ago
Clear & Present Danger: Data Hoarding Undermines Better Security

Facebook and Google can identify patterns of attack within their own data, but smaller businesses rarely see enough traffic to successfully...

Dark Reading | a day ago
Biden Nominates Former NSA Officials for Top Cybersecurity Roles

President Biden has nominated Jen Easterly as the new director of CISA and is expected to nominate Chris Inglis as the first national cyber director.

Dark Reading | 2 days ago

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.