MonthOctober 2019

Tor Weaponized to Steal Bitcoin

A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser.

In A Crowded Endpoint Security Market, Consolidation Is Underway

Experts examine the drivers pushing today's endpoint security market to consolidate as its many players compete to meet organizations' changing demands and transition to the cloud.

CenturyLink Customer Data Exposed

Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report.

Glitching: The Hardware Attack that can Disrupt Secure Software

Glitching (or fault-injection) attacks aren't easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of your cybersecurity planning.

SOC Puppet: Dark Reading Caption Contest Winners

Social engineering, SOC analysts, and Sock puns. And the winners are:

Learn About the Underground World of Anti-Cheats at Black Hat Europe

Applied Security Briefing lineup for this December event also includes expert looks at Google's ClusterFuzz and the art of breaking PDF encryption.

Older Amazon Devices Subject to Old Wi-Fi Vulnerability

The vulnerability in first-generation Echoes and eight-generation Kindles lets an attacker wage man-in-the-middle attacks.

Debug Feature in Web Dev Tool Exposed Trump Campaign Site, Others to Attack

The problem is not with the tool itself but with how some developers and administrators are using it, Comparitech says.

Debug Feature in Web Dev Tool Exposed Trump Campaign Site, Others to Attack

The problem is not with the tool itself but with how some developers and administrators are using it, Comparitech says.

Phishing Campaign Targets Stripe Credentials, Financial Data

Attackers make use of an old trick and evade detection by blocking users from viewing an embedded link when hovering over the URL.