Clinton, Trump Debate 'Twenty-First Century War' Of Cyberattacks
25 Emerging Security Vendors To Watch
7 New Rules For IoT Safety & Vuln Disclosure
State Of The Exploit Kit
7 Ways Cloud Alters The Security Equation
News & Commentary
Clinton, Trump Debate 'Twenty-First Century War' Of Cyberattacks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Lester Holt led with topic of cybersecurity as the first question on national security in Monday's Presidential debate.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
5 Best Practices For Winning the IoT Security Arms Race
Mark Benson & Brian Ericson, Exosite CTO & Software EngineerCommentary
By focusing on a pragmatic approach to security, its possible to develop IoT solutions that will reduce future risk without breaking the bank.
By Mark Benson, CTO, and Brian Ericson, , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
25 Emerging Security Vendors To Watch
Kelly Sheridan, Associate Editor, InformationWeek
A wave of companies is entering the security field armed with technologies to help businesses mitigate the next generation of cyberattacks. Who are these emerging vendors and what can they offer?
By Kelly Sheridan Associate Editor, InformationWeek, 9/27/2016
Comment1 Comment  |  Read  |  Post a Comment
Top 125 Vendors To Watch
InformationWeek Staff, Commentary
InformationWeek and its sister publications Dark Reading and Network Computing have teamed up to bring you a roundup of the hottest vendors in cloud, data management, DevOps, infrastructure, and security. The 125 vendors you'll find here range from established players making strides in their markets to newcomers setting the stage for the future.
By InformationWeek Staff , 9/27/2016
Comment1 Comment  |  Read  |  Post a Comment
Yahoo Confirms August Data Dump Issue Unrelated To Breach Of 500 Million Users
Kelly Jackson Higgins, Executive Editor at Dark ReadingQuick Hits
No 'connection' between August 2016 data dump claims and 2014 nation-state attack, company says.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Sharing Cybersecurity Threat Intelligence Is The Only Way We Win
Matthew Rosenquist, Cybersecurity Strategist for Intel
Security organizations must leverage each others information in order to better predict, prevent, detect, and respond to threats their customers and organizations face.
By Matthew Rosenquist Cybersecurity Strategist for Intel, 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Yahoo Sued By User Over 2014 Hacking
Dark Reading Staff, Quick Hits
New Yorker files lawsuit against Yahoo for recklessness and delay in uncovering hack of half a billion accounts.
By Dark Reading Staff , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Yahoo Breach: US Senator Seeks SEC Role In Probe
Dark Reading Staff, Quick Hits
Democrat Mark Warner asks US Securities and Exchange Commission to investigate whether Yahoo completed obligations post breach discovery.
By Dark Reading Staff , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Mobile Fraud Changes Outlook for Multifactor Authentication
Stephen Maloney, Executive VP, Business Development & Strategy, AcuantCommentary
SMS one-time passcodes just won't cut it anymore. We need new approaches that people will actually use.
By Steve Maloney , 9/27/2016
Comment0 comments  |  Read  |  Post a Comment
Russian 'Fancy Bear' Hackers Hit Mac OS X With New Trojan
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Aerospace victim hit by targeted attack that didn't even exploit a Mac vulnerability.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
Ransomware: Coming To A Hospital Near You?
Christiaan Beek, Threat Intelligence Research, Office of the CTO,Intel Security
10 ways to protect healthcare systems from ransomware and other malware infections.
By Christiaan Beek Threat Intelligence Research, Office of the CTO,Intel Security, 9/26/2016
Comment8 comments  |  Read  |  Post a Comment
Cyber Risk Among Top Concerns For Business Leaders: Study
Kelly Sheridan, Associate Editor, InformationWeekNews
More than 50% of business leaders surveyed in the Travelers Risk Index report cyber, computer, and technology risks are among their top concerns.
By Kelly Sheridan Associate Editor, InformationWeek, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
FBI Probes Dumping Of NSA Hack Tools On Public Site
Dark Reading Staff, Quick Hits
National Security Agency says tools left exposed by mistake - and dumping by presumably Russia-backed hackers Shadow Brokers.
By Dark Reading Staff , 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
Yahoo Breach Could Delay $4.8 Billion Verizon Takeover
Dark Reading Staff, Quick Hits
Verizon may revisit contract with Yahoo on doubts of vulnerabilities in the system after 500 million accounts were found hacked.
By Dark Reading Staff , 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
Microsoft Launches Windows Defender App Guard For Its Edge Browser
Kelly Sheridan, Associate Editor, InformationWeekNews
Microsoft debuts a new tool to strengthen security in its Edge browser for Windows Enterprise customers.
By Kelly Sheridan Associate Editor, InformationWeek, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
What The WADA Hack Proves About Today's Threat Landscape
Gary Newe, Director of Systems Engineering, F5 NetworksCommentary
Fancy Bear's initial release of data on four top American athletes reminds us all to reassess our risks.
By Gary Newe , 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
Adware Campaign Using Advanced Nation-State Obfuscation Techniques
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New report from Carbon Black shows adware may be spreading ransomware, using similar tactics as Operation Aurora.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
State Of The Exploit Kit
Ericka Chickowski, Contributing Writer, Dark Reading
Exploit kit traffic is down considerably following the demise of Nuclear and Angler, but many researchers see it only as a temporary disruption.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/26/2016
Comment0 comments  |  Read  |  Post a Comment
7 New Rules For IoT Safety & Vuln Disclosure
Lysa Myers, Security Researcher, ESETCommentary
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!
By Lysa Myers Security Researcher, ESET, 9/24/2016
Comment0 comments  |  Read  |  Post a Comment
Advisory Body Calls For Stronger Cybersecurity Measures Across Airline Industry
Jai Vijayan, Freelance writerNews
Measures are designed to bolster operational security across all stakeholders in the aviation sector, Wall Street Journal says.
By Jai Vijayan Freelance writer, 9/23/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Will Ackerly, Co-Founder & CTO, Virtru,  9/22/2016
Yahoo Reveals Nation State-Borne Data Breach Affecting A Half-Billion Users
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2016
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Sharing Cybersecurity Threat Intelligence Is The Only Way We Win
Security organizations must leverage each other's information in order to better predict, prevent, detect, and respond to threats their customers and organizations face. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I decided to treat the kiddos to a TV dinner tonight.
Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Flash Poll
Video
Slideshows
Twitter Feed