www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7963
Public Scan
Submitted URL: http://metacast.agora.com/link.asp?m=22650&s=2580501&l=0
Effective URL: https://www.darkreading.com/
Submission Tags: falconsandbox
Submission: On October 06 via api from US — Scanned from DE
Effective URL: https://www.darkreading.com/
Submission Tags: falconsandbox
Submission: On October 06 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Understanding Cyber Attackers - A Dark Reading Nov 17 Event * Black Hat Europe - December 5-8 - Learn More Webinars * Using Zero Trust to Protect Remote and Home Workers Oct 06, 2022 * Strategies for DDoS Resilience and Response Oct 18, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Understanding Cyber Attackers - A Dark Reading Nov 17 Event * Black Hat Europe - December 5-8 - Learn More Webinars * Using Zero Trust to Protect Remote and Home Workers Oct 06, 2022 * Strategies for DDoS Resilience and Response Oct 18, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Understanding Cyber Attackers - A Dark Reading Nov 17 Event * Black Hat Europe - December 5-8 - Learn More Webinars * Using Zero Trust to Protect Remote and Home Workers Oct 06, 2022 * Strategies for DDoS Resilience and Response Oct 18, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Partner Perspectives: Microsoft > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. 4. Event Strategies for DDoS Resilience and Response | Oct 18 Webinar | <REGISTER NOW> Event Using Zero Trust to Protect Remote and Home Workers | Oct 6 Webinar | <REGISTER NOW> Event Understanding Cyber Attackers - A Dark Reading November 17 Virtual Event | <GET YOUR PASS> Report Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW> PreviousNext TOP STORIES CISA: Multiple APT Groups Infiltrate Defense Organization Oct 05, 2022 Advanced attackers gained access to Microsoft Exchange services, conducted searches of email, and used an open source toolkit to collect data from the network for nearly a year. NullMixer Dropper Delivers a Multimalware Code Bomb Oct 05, 2022 In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking Trojans, stealers, and spyware on victims' systems. Microsoft Updates Mitigation for Exchange Server Zero-Days Oct 04, 2022 Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed. Ikea Smart Light System Flaw Lets Attackers Turn Bulbs on Full Blast Oct 05, 2022 With just one malformed Zigbee frame, attackers could take over certain Ikea smart lightbulbs, leaving users unable to turn the lights down. -------------------------------------------------------------------------------- Latest News Relentless Russian Cyberattacks on Ukraine Raise Important Policy Questions Microsoft cybersecurity executive John Hewie explained cyberwar developments and what they mean for Western democratic policy going forward. Microsoft cybersecurity executive John Hewie explained cyberwar developments and what they mean for Western democratic policy going forward. by Tara Seals, Managing Editor, News, Dark Reading Oct 05, 2022 Threat Intelligence 5 MIN READ Article -------------------------------------------------------------------------------- Ikea Smart Light System Flaw Lets Attackers Turn Bulbs on Full Blast With just one malformed Zigbee frame, attackers could take over certain Ikea smart lightbulbs, leaving users unable to turn the lights down. With just one malformed Zigbee frame, attackers could take over certain Ikea smart lightbulbs, leaving users unable to turn the lights down. by Dark Reading Staff, Dark Reading Oct 05, 2022 Application Security 1 MIN READ Article -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- CISA: Multiple APT Groups Infiltrate Defense Organization Advanced attackers gained access to Microsoft Exchange services, conducted searches of email, and used an open source toolkit to collect data from the network for nearly a year. Advanced attackers gained access to Microsoft Exchange services, conducted searches of email, and used an open source toolkit to collect data from the network for nearly a year. by Robert Lemos, Contributing Writer, Dark Reading Oct 05, 2022 Attacks/Breaches 4 MIN READ Article -------------------------------------------------------------------------------- NullMixer Dropper Delivers a Multimalware Code Bomb In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking Trojans, stealers, and spyware on victims' systems. In one shot, Trojan dropper NullMixer installs a suite of downloaders, banking Trojans, stealers, and spyware on victims' systems. by Dark Reading Staff, Dark Reading Oct 05, 2022 Remote Workforce 1 MIN READ Article -------------------------------------------------------------------------------- RatMilad Spyware Scurries onto Enterprise Android Phones A novel mobile malware found lurking behind a phone-spoofing app is being distributed via Telegram and a dedicated website, in a broad operation to monitor corporate victims. A novel mobile malware found lurking behind a phone-spoofing app is being distributed via Telegram and a dedicated website, in a broad operation to monitor corporate victims. by Elizabeth Montalbano, Contributor, Dark Reading Oct 05, 2022 Mobile 5 MIN READ Article -------------------------------------------------------------------------------- Microsoft Updates Mitigation for Exchange Server Zero-Days Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed. Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed. by Jai Vijayan, Contributing Writer, Dark Reading Oct 04, 2022 Remote Workforce 4 MIN READ Article -------------------------------------------------------------------------------- Aussie Telco Telstra Breached, Reportedly Exposing 30,000 Employees' Data The Telstra cyber incident comes just weeks after its main rival Optus suffered a major compromise of its customer database. The Telstra cyber incident comes just weeks after its main rival Optus suffered a major compromise of its customer database. by Dark Reading Staff, Dark Reading Oct 04, 2022 Attacks/Breaches 1 MIN READ Article -------------------------------------------------------------------------------- Former NSA Employee Faces Death Penalty for Selling Secrets Suspect allegedly thought he was swapping secrets with a foreign government for crypto — but the contact turned out to be an FBI agent. Suspect allegedly thought he was swapping secrets with a foreign government for crypto — but the contact turned out to be an FBI agent. by Dark Reading Staff, Dark Reading Oct 04, 2022 Attacks/Breaches 1 MIN READ Article -------------------------------------------------------------------------------- More News Latest Commentary Giving Away the Keys to Your Backups? Here’s How to Keep Out Hackers As threat actors' sophistication has grown dramatically in the last few years, organizations haven't kept up with implementing the necessary countermeasure controls. by John Anthony Smith, Chief Listening Officer, CEO, & Founder, Conversant Group/Fenix 24 Oct 05, 2022 -------------------------------------------------------------------------------- Why Don't CISOs Trust Their Employees? Executives fear "malicious insiders" as top cyber threat to companies, research shows. Reasonable steps to secure and monitor systems may prevent reputational damage but are not enough. by Alex Romero, Co-Founder and COO, Constella Intelligence Oct 05, 2022 -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Workforce Data Privacy in the Modern Work Era It takes culture as well as individual and corporate responsibilities to ensure workforce data privacy and compliance. by Ramon Chen, Chief Product Officer, ActivTrak Oct 04, 2022 -------------------------------------------------------------------------------- Ransomware 3.0: The Next Frontier Attackers are already circling back to reselling stolen data instead of — and in addition to — extortion. by James Gimbi, Senior Director of Technical Advisory Services, Moxfive Oct 04, 2022 -------------------------------------------------------------------------------- Expert Insights: How to Protect Sensitive Machine-Learning Training Data Without Borking It Another element of ML security is the data used to train the machine learning system itself. by Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning Oct 04, 2022 -------------------------------------------------------------------------------- More Commentary Partner Perspectives The Top 4 Mistakes in Security Programs to AvoidOverlooking even just a single security threat can severely erode a company’s community and consumer confidence, tarnish reputation and brand, negatively impact corporate valuations, provide competitors with an advantage, and create unwanted scrutiny. Sep 30, 2022 Read More From Microsoft PRODUCTS & RELEASES NetSPI Raises $410 Million in Growth Funding from KKRMore Than 30% of All Malicious Attacks Target Shadow APIsEclypsium Raises Series B to Protect Digital Supply Chain As Attacks GrowAryaka Delivers Zero-Trust WAN Based on Unified SASE ArchitectureTidal Cyber Closes $4M Funding Round To Expand Threat-Informed Defense TechOnyxia Raises $5M to Help Companies Proactively Manage Cybersecurity Risks Using AICyera Survey Finds One in Three Respondents Want to Minimize Cloud Data RiskSafous Adds Browser Isolation to Its Zero-Trust Network Access ServiceIsrael Cybersecurity Enterprise (ICE) Teams with CybeReady to Deliver World-Class Security Training More Products & Releases Resources White Papers * State of Email Security * BotGuard for Streaming Service Case Study * Top Four Steps to Reduce Ransomware Risk * The Ultimate Buyer's Guide: SASE Security * Cloud Incident Response At a Glance More White Papers Events * Understanding Cyber Attackers - A Dark Reading Nov 17 Event * Black Hat Europe - December 5-8 - Learn More * Black Hat Middle East & Africa - November 15-17 - Learn More More Events Webinars * Using Zero Trust to Protect Remote and Home WorkersOct 06, 2022 * Strategies for DDoS Resilience and ResponseOct 18, 2022 * Next-Gen Security Operations: Building the SOC of the FutureOct 19, 2022 * Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing ResistantOct 25, 2022 * Threat Hunting Today: The Tools and Techniques That Get You Out in Front of CriminalsOct 26, 2022 More Webinars CONNECT WITH US REGISTER FOR A SUBSCRIBE TO THE FOLLOW US DARK READING ACCOUNT DARK READING NEWSLETTER @DARKREADING REGISTER FOR A DARK READING ACCOUNT * Gain full access to resources (events, white paper, webinars, reports, etc.) * Single sign-on to all Informa products REGISTER SUBSCRIBE TO THE DARK READING NEWSLETTER Get daily Dark Reading top stories every morning straight into your inbox SUBSCRIBE FOLLOW US @DARKREADING Follow us @darkreading to stay up-to-date with the latest news & insider information about events & more * * * * DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept