www.darkreading.com Open in urlscan Pro
2606:4700::6811:7563  Public Scan

Submitted URL: https://www.darkreading.com/advanced-threats//
Effective URL: https://www.darkreading.com/advanced-threats
Submission: On January 07 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Securing Your APIs: What You Need to Know
   Jan 25, 2022
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >
Partner Perspectives: Darktrace >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Securing Your APIs: What You Need to Know
   Jan 25, 2022
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >
Partner Perspectives: Darktrace >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Securing Your APIs: What You Need to Know
   Jan 25, 2022
 * Beyond Spam and Phishing: Emerging Email-based Threats
   Jan 18, 2022

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Partner Perspectives: Crowdstrike >
Partner Perspectives: Darktrace >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 
 3. 

Event
Beyond Passwords: New Thinking and Strategies for Authentication | January 27
Webinar | <REGISTER NOW>
Event
Securing Your APIs: What You Need to Know | January 25 Webinar | <REGISTER NOW>
Event
Beyond Spam and Phishing: Emerging Email-based Threats | January 18 Webinar |
<REGISTER NOW>
PreviousNext



ADVANCED THREATS


Why We Need To Reframe the False-Positive Problem
Efforts to tune or build behavior- or signature-based threat identification
requires time and effort most organizations don't have.
January 05, 2022
Efforts to tune or build behavior- or signature-based threat identification
requires time and effort most organizations don't have.

by Matthew Warner, CTO and Co-Founder, Blumira
January 05, 2022
5 min read

Attacks/Breaches


Article
Attackers Exploit Log4j Flaws in Hands-on-Keyboard Attacks to Drop Reverse
Shells
Microsoft says vulnerabilities present a "real and present" danger, citing high
volume of scanning and attack activity targeting the widely used Apache logging
framework.
January 04, 2022
Microsoft says vulnerabilities present a "real and present" danger, citing high
volume of scanning and attack activity targeting the widely used Apache logging
framework.

by Jai Vijayan, Contributing Writer
January 04, 2022
5 min read

Application Security


Article

7 of the Most Impactful Cybersecurity Incidents of 2021
There was a lot to learn from breaches, vulnerabilities, and attacks this year.
December 23, 2021
There was a lot to learn from breaches, vulnerabilities, and attacks this year.

by Jai Vijayan, Contributing Writer
December 23, 2021
1 min read

Attacks/Breaches


Article
New Log4j Attack Vector Discovered
Meanwhile, Apache Foundation releases third update to logging tool in 10 days to
address yet another flaw.
December 20, 2021
Meanwhile, Apache Foundation releases third update to logging tool in 10 days to
address yet another flaw.

by Jai Vijayan, Contributing Writer
December 20, 2021
5 min read

Application Security


Article
PseudoManuscrypt Malware Targeted Government & ICS Systems in 2021
The "PseudoManuscrypt" operation infected some 35,000 computers with
cyber-espionage malware and targeted computers in both government and private
industry.
December 17, 2021
The "PseudoManuscrypt" operation infected some 35,000 computers with
cyber-espionage malware and targeted computers in both government and private
industry.

by Robert Lemos, Contributing Writer
December 17, 2021
4 min read

Threat Intelligence


Article
Why Log4j Mitigation Is Fraught With Challenges
The Log4j flaw exists in a component that is not always easy to detect and is
widely used beyond an organization's own networks and systems.
December 16, 2021
The Log4j flaw exists in a component that is not always easy to detect and is
widely used beyond an organization's own networks and systems.

by Jai Vijayan, Contributing Writer
December 16, 2021
5 min read

Application Security


Article
Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data
Theft
Organizations should upgrade ASAP to new version of logging framework released
Tuesday by the Apache Foundation, security experts say.
December 15, 2021
Organizations should upgrade ASAP to new version of logging framework released
Tuesday by the Apache Foundation, security experts say.

by Jai Vijayan, Contributing Writer
December 15, 2021
5 min read

Application Security


Article
Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft
Most companies lack the proper tools to assess their vulnerability to threats
facing their AI systems and ML pipelines, prompting Microsoft to release a risk
assessment framework.
December 15, 2021
Most companies lack the proper tools to assess their vulnerability to threats
facing their AI systems and ML pipelines, prompting Microsoft to release a risk
assessment framework.

by Robert Lemos, Contributing Writer
December 15, 2021
4 min read

Risk


Article
Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate
Inventory
The early lessons from Log4j indicate that key security principles can help
better handle these high-risk software supply chain security incidents if teams
have proper support.
December 15, 2021
The early lessons from Log4j indicate that key security principles can help
better handle these high-risk software supply chain security incidents if teams
have proper support.

by Fernando Montenegro, Senior Principal Analyst
December 15, 2021
6 min read

Omdia


Article
Privacy and Safety Issues With Facebook's New 'Metaventure'
With access to a user's 3D model and full-body digital tracking, attackers can
recreate the perfect replica of a C-level executive to trick employees.
December 15, 2021
With access to a user's 3D model and full-body digital tracking, attackers can
recreate the perfect replica of a C-level executive to trick employees.

by Zahid Anwar, Associate Professor of Cybersecurity in the NDSU Department of
Computer Science
December 15, 2021
5 min read

Vulnerabilities/Threats


Article
Why Cloud Storage Isn't Immune to Ransomware
Cloud security is a shared responsibility. which sometimes leads to security
gaps and complexity in risk management.
December 15, 2021
Cloud security is a shared responsibility. which sometimes leads to security
gaps and complexity in risk management.

by Shai Morag, CEO, Ermetic
December 15, 2021
4 min read

Attacks/Breaches


Article
Attackers Target Log4j to Drop Ransomware, Web Shells, Backdoors
Amid the increase in Log4j attack activity, at least one Iranian state-backed
threat group is preparing to target the vulnerability, experts say.
December 14, 2021
Amid the increase in Log4j attack activity, at least one Iranian state-backed
threat group is preparing to target the vulnerability, experts say.

by Jai Vijayan, Contributing Writer
December 14, 2021
6 min read

Attacks/Breaches


Article
Combat Misinformation by Getting Back to Security Basics
One volley of fake news may land, but properly trained AI can shut down similar
attempts at their sources.
December 14, 2021
One volley of fake news may land, but properly trained AI can shut down similar
attempts at their sources.

by Dan Spurling, Senior Vice President, Product Engineering, Teradata
December 14, 2021
5 min read

Attacks/Breaches


Article
40% of Corporate Networks Targeted by Attackers Seeking to Exploit Log4j
More than 60 variants of the original exploit were introduced over the last day
alone.
December 13, 2021
More than 60 variants of the original exploit were introduced over the last day
alone.

by Jai Vijayan, Contributing Writer
December 13, 2021
7 min read

Application Security


Article
Why the Private Sector Is Key to Stopping Russian Hacking Group APT29
Left unchecked, these attacks could have devastating effects on government and
military secrets and jeopardize the software supply chain and the global
economy.
December 13, 2021
Left unchecked, these attacks could have devastating effects on government and
military secrets and jeopardize the software supply chain and the global
economy.

by Shmulik Yehezkel, Chief Critical Cyber Operations Officer & CISO, CYE
December 13, 2021
5 min read

Attacks/Breaches


Article


DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2022 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept