Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Zero-Day Malvertising Attack Went Undetected For Two Months
Newest First  |  Oldest First  |  Threaded View
SgS125
50%
50%
SgS125,
User Rank: Ninja
4/22/2015 | 10:23:03 AM
So all the way to day 2 at RSA before anything to write about?

Wondered how far the value of the RSA conference  had fallen.

Thanks for reinforcing my decision to never go again.  I had trouble finding anything of value last year and it seems that the content has gone to an even lower standard.  I guesss last Decembers news is good enough for the RSA crowd.

 

Maybe they got a few people to attend the guy who gets kicked off the United flight speech.

 

Hang in there only a few more hours till cocktail time in Frisco where the real RSA action happens.

RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/22/2015 | 8:46:14 AM
Hiding in plain site
It's amazing how the malvertising attacks were injected in ads hosted by such well known websites. Many I would have considered reputable and trustworthy. Its scary to see that these things are hiding in such widely trafficked areas.

I remember reading an article stating that ad space is difficult to lock down as everyone, not only people with genuine need, can buy ad space.
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
4/22/2015 | 7:12:27 AM
Scary
Ransomware creeps me out. Even though I have multiple back ups of my important files, folders and images, I really would rather the people that put the software together just stole money from my bank account. I can always earn that back, but personal files and images are totally irreplaceable. 

It's a great reason for people to make sure their files are well protected. 


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24028
PUBLISHED: 2021-04-14
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
CVE-2021-29370
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
CVE-2021-3460
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version 2.0.0.301, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
CVE-2021-3462
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object.
CVE-2021-3463
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could cause systems to experience a blue screen error.