www.darkreading.com Open in urlscan Pro
2606:4700::6811:7963  Public Scan

Submitted URL: http://metacast.agora.com/link.asp?m=22650&s=2580501&l=0
Effective URL: https://www.darkreading.com/
Submission Tags: falconsandbox
Submission: On October 06 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Remote Workforce

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Understanding Cyber Attackers - A Dark Reading Nov 17 Event
   
 * Black Hat Europe - December 5-8 - Learn More
   

Webinars
 * Using Zero Trust to Protect Remote and Home Workers
   Oct 06, 2022
 * Strategies for DDoS Resilience and Response
   Oct 18, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Remote Workforce

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Understanding Cyber Attackers - A Dark Reading Nov 17 Event
   
 * Black Hat Europe - December 5-8 - Learn More
   

Webinars
 * Using Zero Trust to Protect Remote and Home Workers
   Oct 06, 2022
 * Strategies for DDoS Resilience and Response
   Oct 18, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Remote Workforce

Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Understanding Cyber Attackers - A Dark Reading Nov 17 Event
   
 * Black Hat Europe - December 5-8 - Learn More
   

Webinars
 * Using Zero Trust to Protect Remote and Home Workers
   Oct 06, 2022
 * Strategies for DDoS Resilience and Response
   Oct 18, 2022

Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 
 3. 
 4. 

Event
Strategies for DDoS Resilience and Response | Oct 18 Webinar | <REGISTER NOW>
Event
Using Zero Trust to Protect Remote and Home Workers | Oct 6 Webinar | <REGISTER
NOW>
Event
Understanding Cyber Attackers - A Dark Reading November 17 Virtual Event | <GET
YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top
of Mind | <READ IT NOW>
PreviousNext
TOP STORIES
CISA: Multiple APT Groups Infiltrate Defense Organization

Oct 05, 2022

Advanced attackers gained access to Microsoft Exchange services, conducted
searches of email, and used an open source toolkit to collect data from the
network for nearly a year.

NullMixer Dropper Delivers a Multimalware Code Bomb
Oct 05, 2022
In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking
Trojans, stealers, and spyware on victims' systems.

Microsoft Updates Mitigation for Exchange Server Zero-Days
Oct 04, 2022
Researchers had discovered that Microsoft's original mitigation steps for the
so-called "ProxyNotShell" flaws was easily bypassed.
Ikea Smart Light System Flaw Lets Attackers Turn Bulbs on Full Blast
Oct 05, 2022
With just one malformed Zigbee frame, attackers could take over certain Ikea
smart lightbulbs, leaving users unable to turn the lights down.

--------------------------------------------------------------------------------

Latest News

Relentless Russian Cyberattacks on Ukraine Raise Important Policy Questions

Microsoft cybersecurity executive John Hewie explained cyberwar developments and
what they mean for Western democratic policy going forward.

Microsoft cybersecurity executive John Hewie explained cyberwar developments and
what they mean for Western democratic policy going forward.

by Tara Seals, Managing Editor, News, Dark Reading

Oct 05, 2022

Threat Intelligence
5 MIN READ

Article

--------------------------------------------------------------------------------

Ikea Smart Light System Flaw Lets Attackers Turn Bulbs on Full Blast

With just one malformed Zigbee frame, attackers could take over certain Ikea
smart lightbulbs, leaving users unable to turn the lights down.

With just one malformed Zigbee frame, attackers could take over certain Ikea
smart lightbulbs, leaving users unable to turn the lights down.

by Dark Reading Staff, Dark Reading

Oct 05, 2022

Application Security
1 MIN READ

Article

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

CISA: Multiple APT Groups Infiltrate Defense Organization

Advanced attackers gained access to Microsoft Exchange services, conducted
searches of email, and used an open source toolkit to collect data from the
network for nearly a year.

Advanced attackers gained access to Microsoft Exchange services, conducted
searches of email, and used an open source toolkit to collect data from the
network for nearly a year.

by Robert Lemos, Contributing Writer, Dark Reading

Oct 05, 2022

Attacks/Breaches
4 MIN READ

Article

--------------------------------------------------------------------------------

NullMixer Dropper Delivers a Multimalware Code Bomb

In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking
Trojans, stealers, and spyware on victims' systems.

In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking
Trojans, stealers, and spyware on victims' systems.

by Dark Reading Staff, Dark Reading

Oct 05, 2022

Remote Workforce
1 MIN READ

Article

--------------------------------------------------------------------------------

RatMilad Spyware Scurries onto Enterprise Android Phones

A novel mobile malware found lurking behind a phone-spoofing app is being
distributed via Telegram and a dedicated website, in a broad operation to
monitor corporate victims.

A novel mobile malware found lurking behind a phone-spoofing app is being
distributed via Telegram and a dedicated website, in a broad operation to
monitor corporate victims.

by Elizabeth Montalbano, Contributor, Dark Reading

Oct 05, 2022

Mobile
5 MIN READ

Article

--------------------------------------------------------------------------------

Microsoft Updates Mitigation for Exchange Server Zero-Days

Researchers had discovered that Microsoft's original mitigation steps for the
so-called "ProxyNotShell" flaws was easily bypassed.

Researchers had discovered that Microsoft's original mitigation steps for the
so-called "ProxyNotShell" flaws was easily bypassed.

by Jai Vijayan, Contributing Writer, Dark Reading

Oct 04, 2022

Remote Workforce
4 MIN READ

Article

--------------------------------------------------------------------------------

Aussie Telco Telstra Breached, Reportedly Exposing 30,000 Employees' Data

The Telstra cyber incident comes just weeks after its main rival Optus suffered
a major compromise of its customer database.

The Telstra cyber incident comes just weeks after its main rival Optus suffered
a major compromise of its customer database.

by Dark Reading Staff, Dark Reading

Oct 04, 2022

Attacks/Breaches
1 MIN READ

Article

--------------------------------------------------------------------------------

Former NSA Employee Faces Death Penalty for Selling Secrets

Suspect allegedly thought he was swapping secrets with a foreign government for
crypto — but the contact turned out to be an FBI agent.

Suspect allegedly thought he was swapping secrets with a foreign government for
crypto — but the contact turned out to be an FBI agent.

by Dark Reading Staff, Dark Reading

Oct 04, 2022

Attacks/Breaches
1 MIN READ

Article

--------------------------------------------------------------------------------

More News

Latest Commentary

Giving Away the Keys to Your Backups? Here’s How to Keep Out Hackers

As threat actors' sophistication has grown dramatically in the last few years,
organizations haven't kept up with implementing the necessary countermeasure
controls.

by John Anthony Smith, Chief Listening Officer, CEO, & Founder, Conversant
Group/Fenix 24

Oct 05, 2022

--------------------------------------------------------------------------------

Why Don't CISOs Trust Their Employees?

Executives fear "malicious insiders" as top cyber threat to companies, research
shows. Reasonable steps to secure and monitor systems may prevent reputational
damage but are not enough.

by Alex Romero, Co-Founder and COO, Constella Intelligence

Oct 05, 2022

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Workforce Data Privacy in the Modern Work Era

It takes culture as well as individual and corporate responsibilities to ensure
workforce data privacy and compliance.

by Ramon Chen, Chief Product Officer, ActivTrak

Oct 04, 2022

--------------------------------------------------------------------------------

Ransomware 3.0: The Next Frontier

Attackers are already circling back to reselling stolen data instead of — and in
addition to — extortion.

by James Gimbi, Senior Director of Technical Advisory Services, Moxfive

Oct 04, 2022

--------------------------------------------------------------------------------

Expert Insights: How to Protect Sensitive Machine-Learning Training Data Without
Borking It

Another element of ML security is the data used to train the machine learning
system itself.

by Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning

Oct 04, 2022

--------------------------------------------------------------------------------

More Commentary



Partner Perspectives

The Top 4 Mistakes in Security Programs to AvoidOverlooking even just a single
security threat can severely erode a company’s community and consumer
confidence, tarnish reputation and brand, negatively impact corporate
valuations, provide competitors with an advantage, and create unwanted scrutiny.
Sep 30, 2022
Read More From Microsoft


PRODUCTS & RELEASES



NetSPI Raises $410 Million in Growth Funding from KKRMore Than 30% of All
Malicious Attacks Target Shadow APIsEclypsium Raises Series B to Protect Digital
Supply Chain As Attacks GrowAryaka Delivers Zero-Trust WAN Based on Unified SASE
ArchitectureTidal Cyber Closes $4M Funding Round To Expand Threat-Informed
Defense TechOnyxia Raises $5M to Help Companies Proactively Manage Cybersecurity
Risks Using AICyera Survey Finds One in Three Respondents Want to Minimize Cloud
Data RiskSafous Adds Browser Isolation to Its Zero-Trust Network Access
ServiceIsrael Cybersecurity Enterprise (ICE) Teams with CybeReady to Deliver
World-Class Security Training
More Products & Releases
Resources
White Papers
 * State of Email Security
 * BotGuard for Streaming Service Case Study
 * Top Four Steps to Reduce Ransomware Risk
 * The Ultimate Buyer's Guide: SASE Security
 * Cloud Incident Response At a Glance

More White Papers
Events
 * Understanding Cyber Attackers - A Dark Reading Nov 17 Event
 * Black Hat Europe - December 5-8 - Learn More
 * Black Hat Middle East & Africa - November 15-17 - Learn More

More Events
Webinars
 * Using Zero Trust to Protect Remote and Home WorkersOct 06, 2022
 * Strategies for DDoS Resilience and ResponseOct 18, 2022
 * Next-Gen Security Operations: Building the SOC of the FutureOct 19, 2022
 * Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA
   Solution Phishing ResistantOct 25, 2022
 * Threat Hunting Today: The Tools and Techniques That Get You Out in Front of
   CriminalsOct 26, 2022

More Webinars

CONNECT WITH US

REGISTER FOR A

SUBSCRIBE TO THE

FOLLOW US

DARK READING ACCOUNT

DARK READING NEWSLETTER

@DARKREADING

REGISTER FOR A

DARK READING ACCOUNT

 * Gain full access to resources (events, white paper, webinars, reports, etc.)
 * Single sign-on to all Informa products

REGISTER

SUBSCRIBE TO THE

DARK READING NEWSLETTER

Get daily Dark Reading top stories every morning straight into your inbox

SUBSCRIBE

FOLLOW US

@DARKREADING

Follow us @darkreading to stay up-to-date with the latest news & insider
information about events & more

 * 
 * 
 * 
 * 



DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2022 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept