Vulnerabilities / Threats // Advanced Threats
News & Commentary
To Gain Influence, CISOs Must Get Security's Human Element Right
Rocco Grillo, Cyber Resilience Leader at Stroz FriedbergCommentary
Focusing on certain elements of security in isolation can cause a false sense of security.
By Rocco Grillo Cyber Resilience Leader at Stroz Friedberg, 3/29/2017
Comment1 Comment  |  Read  |  Post a Comment
Should Trump Tackle Air-Gapped Critical Infrastructure?
Ericka Chickowski, Contributing Writer, Dark ReadingNews
MIT experts issue recommendations to the president, urging him to take elements of the electric grid and gas pipeline offline - but other security experts say that ship has sailed.
By Ericka Chickowski Contributing Writer, Dark Reading, 3/28/2017
Comment1 Comment  |  Read  |  Post a Comment
5 Ways CISOs Could Work Better with Their Cyber Insurers
Pascal Millaire, Vice President at Symantec and General Manager of the  Cyber Insurance GroupCommentary
Risk management has become increasingly important, making it crucial companies have good relationships with their insurance company.
By Pascal Millaire Vice President at Symantec and General Manager of the Cyber Insurance Group, 3/23/2017
Comment0 comments  |  Read  |  Post a Comment
Cisco Issues Advisory on Flaw in Hundreds of Switches
Dark Reading Staff, Quick Hits
Vulnerability was discovered in WikiLeaks recent data dump on CIAs secret cyber-offensive unit.
By Dark Reading Staff , 3/21/2017
Comment1 Comment  |  Read  |  Post a Comment
Ethical Hacking: The Most Important Job No One Talks About
Amit Ashbel, Cybersecurity Evangelist at CheckmarxCommentary
If your company doesn't have an ethical hacker on the security team, it's playing a one-sided game of defense against attackers.
By Amit Ashbel Cybersecurity Evangelist at Checkmarx, 3/16/2017
Comment4 comments  |  Read  |  Post a Comment
Twitter Counter Hack Uses Familiar Attack Mode
Steve Zurier, Freelance WriterNews
Experts advise users to be more aware of the potential downside of third-party apps.
By Steve Zurier Freelance Writer, 3/15/2017
Comment0 comments  |  Read  |  Post a Comment
What Your SecOps Team Can (and Should) Do
Chris Crowley, Independent Consultant at Montance, LLCCommentary
If your organization has all of these pieces in place, congratulations!
By Chris Crowley Independent Consultant at Montance, LLC, 3/13/2017
Comment0 comments  |  Read  |  Post a Comment
This Week On Dark Reading: Events Calendar
Dark Reading Staff, Commentary
How to become a threat hunter, how to build a cybersecurity architecture that actually defends against today's risks, and much more...
By Dark Reading Staff , 3/13/2017
Comment1 Comment  |  Read  |  Post a Comment
IoT & Liability: How Organizations Can Hold Themselves Accountable
Richard Henderson, Global Security Strategist, AbsoluteCommentary
To avoid a lawsuit, your company needs to better understand the state of your infrastructure and the devices and applications within it. Here are five areas on which to focus.
By Richard Henderson Global Security Strategist, Absolute, 3/10/2017
Comment0 comments  |  Read  |  Post a Comment
WikiLeaks Says It Will Help Firms Thwart 'CIA Hack Tools'
Dark Reading Staff, Quick Hits
Julian Assange follows up leak of alleged CIA cyber espionage hack tools with promise of assistance against these.
By Dark Reading Staff , 3/10/2017
Comment0 comments  |  Read  |  Post a Comment
In a Cybersecurity Vendor War, the End User Loses
Morey Haber, VP, Technology, BeyondTrustCommentary
When vulnerability information is disclosed without a patch available, users are the ones really being punished.
By Morey Haber VP, Technology, BeyondTrust, 3/8/2017
Comment3 comments  |  Read  |  Post a Comment
A Real-Life Look into Responsible Disclosure for Security Vulnerabilities
Marc Laliberte, Information Security Threat Analyst, WatchGuard TechnologiesCommentary
A researcher gives us a glimpse into what happened when he found a problem with an IoT device.
By Marc Laliberte Information Security Threat Analyst, WatchGuard Technologies, 3/7/2017
Comment2 comments  |  Read  |  Post a Comment
Three Years after Heartbleed, How Vulnerable Are You?
Jeff Luszcz, Vice President of Product Management at Flexera  SoftwareCommentary
You may have a problem lurking in your open source components and not know it. Start making a list...
By Jeff Luszcz Vice President of Product Management at Flexera Software, 3/2/2017
Comment0 comments  |  Read  |  Post a Comment
Best Practices for Lowering Ransomware Risk
Jeff Schilling, Chief Security Officer, ArmorCommentary
The first step is to avoid falling prey in the first place. That means teaching your entire organization - from IT staff to executive management - how not to be a victim.
By Jeff Schilling Chief Security Officer, Armor, 3/1/2017
Comment1 Comment  |  Read  |  Post a Comment
Zones of Trust: A New Way of Thinking about IoT Security
Vince Ricco, Technology Partner Manager, Axis CommunicationsCommentary
Recent attacks have focused attention on how to safely add "things"to enterprise networks, a topic that straddles IT and physical security. A zones-of-trust approach may be the answer.
By Vince Ricco Technology Partner Manager, Axis Communications, 2/28/2017
Comment0 comments  |  Read  |  Post a Comment
IaaS: The Next Chapter In Cloud Security
Kaushik Narayan, Co-Founder and CTO at Skyhigh NetworksCommentary
Organizations adopting IaaS must update their approach to security by using the shared responsibility model.
By Kaushik Narayan Co-Founder and CTO at Skyhigh Networks, 2/24/2017
Comment0 comments  |  Read  |  Post a Comment
Tunneling Through The "Walls" Of IoT In The Enterprise
Jose Nazario, Director of Security Research at FastlyCommentary
The movie "Die Hard" has a thing or two to teach us about the pitfalls of the Internet of Things.
By Jose Nazario Director of Security Research at Fastly, 2/22/2017
Comment1 Comment  |  Read  |  Post a Comment
Controlling Privileged Access To Prevent Rogue Users In Active Directory
Derek Melber, Technical Evangelist for ManageEngineCommentary
Knowing which of your employees have which privileges is the first step to staying safe.
By Derek Melber Technical Evangelist for ManageEngine, 2/20/2017
Comment1 Comment  |  Read  |  Post a Comment
After Election Interference, RSA Conference Speakers Ask What Comes Next
Sara Peters, Senior Editor at Dark ReadingNews
Election-tampering called 'a red line we should not allow anyone to cross.'
By Sara Peters Senior Editor at Dark Reading, 2/17/2017
Comment1 Comment  |  Read  |  Post a Comment
Microsoft President Says Tech Industry Should Be 'Neutral Digital Switzerland'
Sara Peters, Senior Editor at Dark ReadingQuick Hits
RSA Conference: Brad Smith also says the world needs a "Digital Geneva Convention" to establish the international rules for nation-state cyber conflict.
By Sara Peters Senior Editor at Dark Reading, 2/14/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.