7 Deadly Sins That Get Users Hacked
Verizon DBIR: Mobile Devices Not A Factor In Real-World Attacks
Setting Security Professionals Up For Success
New Security Flaw Spans All Versions Of Windows
Apple Patches 'Darwin Nuke,' Other Security Flaws With New OS Releases
News & Commentary
Waratek Wins RSA Innovation Sandbox
Sara Peters, Senior Editor at Dark ReadingNews
RSA: 10th annual event honors runtime application self protection solution for solving Java security problems.
By Sara Peters Senior Editor at Dark Reading, 4/20/2015
Comment0 comments  |  Read  |  Post a Comment
White House's Daniel 'Intrigued' By UL-Type Model For IoT Security
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Michael Daniel, the national cybersecurity coordinator and assistant to the President, talks Internet of Things security and recent Executive Orders on intel-sharing and sanctions.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/20/2015
Comment0 comments  |  Read  |  Post a Comment
DHS: Most Organizations Need Improvement In Managing Security Risk
Rutrell Yasin, Business Technology Writer, Tech Writers BureauCommentary
At a Department of Homeland Security Summit, government and corporate security teams are taken to task for failing to address critical issues of software assurance, testing and lifecycle support.
By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 4/20/2015
Comment0 comments  |  Read  |  Post a Comment
APT Group 'Pawn Storm' Ratchets Up Attacks
Jai Vijayan, Freelance writerNews
Threat actors have set up several new C&C servers and dozens of new malicious URLs -- and now targeting White House staffers, Trend Micro says.
By Jai Vijayan Freelance writer, 4/17/2015
Comment0 comments  |  Read  |  Post a Comment
Inside the 4 Most Common Threat Actor Tools
 Dr. Chase Cunningham, Head of Threat Intelligence, FireHostCommentary
How do you prevent your environment from becoming the next target? Turn the tables on your attackers.
By Dr. Chase Cunningham Head of Threat Intelligence, FireHost, 4/17/2015
Comment0 comments  |  Read  |  Post a Comment
Popular Home Automation System Backdoored Via Unpatched Flaw
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Malicious firmware update could lead to device, full home network 0wnage, researcher will show next week at the RSA Conference.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/16/2015
Comment2 comments  |  Read  |  Post a Comment
7 Deadly Sins That Get Users Hacked
Ericka Chickowski, Contributing Writer, Dark Reading
How users and their endpoints are leveraged by the bad guys to eventually find their way to critical data
By Ericka Chickowski Contributing Writer, Dark Reading, 4/16/2015
Comment9 comments  |  Read  |  Post a Comment
Breach Defense Playbook
Ryan Vela  , Regional Director for General Dynamics Fidelis Cybersecurity Solutions (GDFidelis)
How to be smart about defending against your next attack.
By Ryan Vela Regional Director for General Dynamics Fidelis Cybersecurity Solutions (GDFidelis), 4/16/2015
Comment0 comments  |  Read  |  Post a Comment
5 Cyberwar Threats Worth Watching
Joe Stanganelli, Attorney, Beacon Hill Law
Approximately 60 nation-states are presently developing their own advanced cyber warfare programs.
By Joe Stanganelli Attorney, Beacon Hill Law, 4/16/2015
Comment2 comments  |  Read  |  Post a Comment
Microsoft Zero-Day Bug Being Exploited In The Wild
Sara Peters, Senior Editor at Dark ReadingNews
As attacks mount, and over 70 million websites remain vulnerable, advice is "fix now."
By Sara Peters Senior Editor at Dark Reading, 4/16/2015
Comment0 comments  |  Read  |  Post a Comment
Harnessing The Power Of Cyber Threat Intelligence
Stu Solomon,  VP, General Counsel & Chief Risk Officer, iSIGHT PartnersCommentary
Here are six real-world examples of how changing your modus operandi from reactive to proactive can drive rapid response to the threats that matter.
By Stu Solomon VP, General Counsel & Chief Risk Officer, iSIGHT Partners, 4/16/2015
Comment2 comments  |  Read  |  Post a Comment
4 Backup Landmines Waiting For The Unwary
Ratmir Timashev, President and CEO, Veeam SoftwareCommentary
Veeam CEO Ratmir Timashev warns about the pitfalls hidden in the process of conducting regular data backups.
By Ratmir Timashev President and CEO, Veeam Software, 4/16/2015
Comment0 comments  |  Read  |  Post a Comment
How Ionic Says It Makes Data Breaches Irrelevant
Sara Peters, Senior Editor at Dark ReadingNews
Ionic Security goes public with a data security platform that manages trillions of encryption keys and enables a user to sign each pixel with its own unique key.
By Sara Peters Senior Editor at Dark Reading, 4/15/2015
Comment2 comments  |  Read  |  Post a Comment
HackerOne Now Offers Bounties For New Bug Discovery Tools And Techniques
Jai Vijayan, Freelance writerNews
Tools are a more cost-efficient option for finding bugs in mature products, new research shows.
By Jai Vijayan Freelance writer, 4/15/2015
Comment1 Comment  |  Read  |  Post a Comment
Predictive Analytics: The Future Is Now
Vincent Weafer, Senior Vice President, Intel Security
Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest stages.
By Vincent Weafer Senior Vice President, Intel Security, 4/15/2015
Comment0 comments  |  Read  |  Post a Comment
Youth, Apathy, And Salary Dictate Mobile Threats To Business
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Mobile cyberattacks may not be a thing today, but a new study shows how vulnerable businesses are via user smartphones and tablets.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/15/2015
Comment11 comments  |  Read  |  Post a Comment
Why Standardized Threat Data Will Help Stop the Next Big Breach
Bill Nelson, President & CEO, Financial Services Information Sharing and Analysis Center (FS-ISAC) and CEO, SoltraCommentary
Adopting industry standards for threat intelligence will reduce a lot of the heavy lifting and free cyber security first responders to focus on what they do best.
By Bill Nelson President & CEO, Financial Services Information Sharing and Analysis Center (FS-ISAC) and CEO, Soltra, 4/15/2015
Comment0 comments  |  Read  |  Post a Comment
'APT-On-APT' Action
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New spin on the cyber espionage attack: spies hacking other spies for information.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/14/2015
Comment0 comments  |  Read  |  Post a Comment
Threat Intelligence Is a Two-Way Street
Emilio Iasiello, Senior Cyber Intelligence Analyst at Fidelis Cybersecurity Solutions
Intelligence analysis should be looked upon as less of a service and more of a partnership.
By Emilio Iasiello Senior Cyber Intelligence Analyst at Fidelis Cybersecurity Solutions, 4/14/2015
Comment0 comments  |  Read  |  Post a Comment
Authorities Take Down Malware-Distributing Simda Botnet
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Fourteen C&Cs dismantled to take out nerve center of a botnet that spanned 190 countries.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/14/2015
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Youth, Apathy, And Salary Dictate Mobile Threats To Business
Kelly Jackson Higgins, Executive Editor at Dark Reading,  4/15/2015
7 Deadly Sins That Get Users Hacked
Ericka Chickowski, Contributing Writer, Dark Reading,  4/16/2015
Authorities Take Down Malware-Distributing Simda Botnet
Ericka Chickowski, Contributing Writer, Dark Reading,  4/14/2015
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Predictive Analytics: The Future Is Now
Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest stages. Read >>
Partner Perspectives
What's This?
Hacking Vulnerable Medical Equipment Puts Millions at Risk
Hospitals and medical device manufacturers need to start doing more to detect and thwart incoming attacks on networks and devices. Read >>
Partner Perspectives
What's This?
Cartoon
Latest Comment: nice one
Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.
White Papers
Current Issue
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0702
Published: 2015-04-20
Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cisco Unified MeetingPlace 8.6(1.9) allows remote authenticated users to execute arbitrary code by using the languageShortName parameter to upload a file that provides shell access, aka Bug ID CSCus95712.

CVE-2015-0703
Published: 2015-04-20
Cross-site scripting (XSS) vulnerability in the administrative web interface in Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus95857.

CVE-2015-1235
Published: 2015-04-19
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.

CVE-2015-1236
Published: 2015-04-19
The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a cr...

CVE-2015-1237
Published: 2015-04-19
Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages ...

10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Flash Poll
Video
Slideshows
Twitter Feed