www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7563
Public Scan
Submitted URL: https://www.darkreading.com/advanced-threats//
Effective URL: https://www.darkreading.com/advanced-threats
Submission: On January 07 via api from US — Scanned from DE
Effective URL: https://www.darkreading.com/advanced-threats
Submission: On January 07 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Securing Your APIs: What You Need to Know Jan 25, 2022 * Beyond Spam and Phishing: Emerging Email-based Threats Jan 18, 2022 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Partner Perspectives: Crowdstrike > Partner Perspectives: Darktrace > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Securing Your APIs: What You Need to Know Jan 25, 2022 * Beyond Spam and Phishing: Emerging Email-based Threats Jan 18, 2022 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Partner Perspectives: Crowdstrike > Partner Perspectives: Darktrace > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Black Hat news Omdia Research Security Now Events Close Back Events Events * Black Hat Spring Trainings 2022 - February 28 - March 3 - Learn More * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV Webinars * Securing Your APIs: What You Need to Know Jan 25, 2022 * Beyond Spam and Phishing: Emerging Email-based Threats Jan 18, 2022 Resources Close Back Resources White Papers > Reports > Issues > Tech Library > Slideshows > Partner Perspectives: Crowdstrike > Partner Perspectives: Darktrace > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. Event Beyond Passwords: New Thinking and Strategies for Authentication | January 27 Webinar | <REGISTER NOW> Event Securing Your APIs: What You Need to Know | January 25 Webinar | <REGISTER NOW> Event Beyond Spam and Phishing: Emerging Email-based Threats | January 18 Webinar | <REGISTER NOW> PreviousNext ADVANCED THREATS Why We Need To Reframe the False-Positive Problem Efforts to tune or build behavior- or signature-based threat identification requires time and effort most organizations don't have. January 05, 2022 Efforts to tune or build behavior- or signature-based threat identification requires time and effort most organizations don't have. by Matthew Warner, CTO and Co-Founder, Blumira January 05, 2022 5 min read Attacks/Breaches Article Attackers Exploit Log4j Flaws in Hands-on-Keyboard Attacks to Drop Reverse Shells Microsoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely used Apache logging framework. January 04, 2022 Microsoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely used Apache logging framework. by Jai Vijayan, Contributing Writer January 04, 2022 5 min read Application Security Article 7 of the Most Impactful Cybersecurity Incidents of 2021 There was a lot to learn from breaches, vulnerabilities, and attacks this year. December 23, 2021 There was a lot to learn from breaches, vulnerabilities, and attacks this year. by Jai Vijayan, Contributing Writer December 23, 2021 1 min read Attacks/Breaches Article New Log4j Attack Vector Discovered Meanwhile, Apache Foundation releases third update to logging tool in 10 days to address yet another flaw. December 20, 2021 Meanwhile, Apache Foundation releases third update to logging tool in 10 days to address yet another flaw. by Jai Vijayan, Contributing Writer December 20, 2021 5 min read Application Security Article PseudoManuscrypt Malware Targeted Government & ICS Systems in 2021 The "PseudoManuscrypt" operation infected some 35,000 computers with cyber-espionage malware and targeted computers in both government and private industry. December 17, 2021 The "PseudoManuscrypt" operation infected some 35,000 computers with cyber-espionage malware and targeted computers in both government and private industry. by Robert Lemos, Contributing Writer December 17, 2021 4 min read Threat Intelligence Article Why Log4j Mitigation Is Fraught With Challenges The Log4j flaw exists in a component that is not always easy to detect and is widely used beyond an organization's own networks and systems. December 16, 2021 The Log4j flaw exists in a component that is not always easy to detect and is widely used beyond an organization's own networks and systems. by Jai Vijayan, Contributing Writer December 16, 2021 5 min read Application Security Article Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft Organizations should upgrade ASAP to new version of logging framework released Tuesday by the Apache Foundation, security experts say. December 15, 2021 Organizations should upgrade ASAP to new version of logging framework released Tuesday by the Apache Foundation, security experts say. by Jai Vijayan, Contributing Writer December 15, 2021 5 min read Application Security Article Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting Microsoft to release a risk assessment framework. December 15, 2021 Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting Microsoft to release a risk assessment framework. by Robert Lemos, Contributing Writer December 15, 2021 4 min read Risk Article Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate Inventory The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security incidents if teams have proper support. December 15, 2021 The early lessons from Log4j indicate that key security principles can help better handle these high-risk software supply chain security incidents if teams have proper support. by Fernando Montenegro, Senior Principal Analyst December 15, 2021 6 min read Omdia Article Privacy and Safety Issues With Facebook's New 'Metaventure' With access to a user's 3D model and full-body digital tracking, attackers can recreate the perfect replica of a C-level executive to trick employees. December 15, 2021 With access to a user's 3D model and full-body digital tracking, attackers can recreate the perfect replica of a C-level executive to trick employees. by Zahid Anwar, Associate Professor of Cybersecurity in the NDSU Department of Computer Science December 15, 2021 5 min read Vulnerabilities/Threats Article Why Cloud Storage Isn't Immune to Ransomware Cloud security is a shared responsibility. which sometimes leads to security gaps and complexity in risk management. December 15, 2021 Cloud security is a shared responsibility. which sometimes leads to security gaps and complexity in risk management. by Shai Morag, CEO, Ermetic December 15, 2021 4 min read Attacks/Breaches Article Attackers Target Log4j to Drop Ransomware, Web Shells, Backdoors Amid the increase in Log4j attack activity, at least one Iranian state-backed threat group is preparing to target the vulnerability, experts say. December 14, 2021 Amid the increase in Log4j attack activity, at least one Iranian state-backed threat group is preparing to target the vulnerability, experts say. by Jai Vijayan, Contributing Writer December 14, 2021 6 min read Attacks/Breaches Article Combat Misinformation by Getting Back to Security Basics One volley of fake news may land, but properly trained AI can shut down similar attempts at their sources. December 14, 2021 One volley of fake news may land, but properly trained AI can shut down similar attempts at their sources. by Dan Spurling, Senior Vice President, Product Engineering, Teradata December 14, 2021 5 min read Attacks/Breaches Article 40% of Corporate Networks Targeted by Attackers Seeking to Exploit Log4j More than 60 variants of the original exploit were introduced over the last day alone. December 13, 2021 More than 60 variants of the original exploit were introduced over the last day alone. by Jai Vijayan, Contributing Writer December 13, 2021 7 min read Application Security Article Why the Private Sector Is Key to Stopping Russian Hacking Group APT29 Left unchecked, these attacks could have devastating effects on government and military secrets and jeopardize the software supply chain and the global economy. December 13, 2021 Left unchecked, these attacks could have devastating effects on government and military secrets and jeopardize the software supply chain and the global economy. by Shmulik Yehezkel, Chief Critical Cyber Operations Officer & CISO, CYE December 13, 2021 5 min read Attacks/Breaches Article DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept