News & Commentary
Latest Content
Page 1 / 2   >   >>
RSA: Follow Keynote Sessions on Dark Reading
News  |  4/21/2015  | 
RSA's new CEO, Amit Yoran takes aim at SIEM. Follow here for more from the first morning of keynote sessions at the RSA Conference.
Virginia Forms First State-Level Cyberthreat Intel-Sharing Organization
Quick Hits  |  4/21/2015  | 
Governor Terry McAuliffe today announced Virginia's new Information Sharing and Analysis Organization (ISAO).
Health Insurers’ Digital Footprint Widening Attack Surface
Commentary  |  4/21/2015  | 
Insurers are ripe targets for attackers since they’re efficient concentrators of every kind of data needed for identity theft, credit card and insurance fraud. Here’s proof.
Waratek Wins RSA Innovation Sandbox
News  |  4/20/2015  | 
RSA: 10th annual event honors runtime application self protection solution for solving Java security problems.
White House's Daniel 'Intrigued' By UL-Type Model For IoT Security
News  |  4/20/2015  | 
Michael Daniel, the national cybersecurity coordinator and assistant to the President, talks Internet of Things security and recent Executive Orders on intel-sharing and sanctions.
DHS: Most Organizations Need Improvement In Managing Security Risk
Commentary  |  4/20/2015  | 
At a Department of Homeland Security Summit, government and corporate security teams are taken to task for failing to address critical issues of software assurance, testing and lifecycle support.
APT Group 'Pawn Storm' Ratchets Up Attacks
News  |  4/17/2015  | 
Threat actors have set up several new C&C servers and dozens of new malicious URLs -- and now targeting White House staffers, Trend Micro says.
Inside the 4 Most Common Threat Actor Tools
Commentary  |  4/17/2015  | 
How do you prevent your environment from becoming the next target? Turn the tables on your attackers.
Popular Home Automation System Backdoored Via Unpatched Flaw
News  |  4/16/2015  | 
Malicious firmware update could lead to device, full home network 0wnage, researcher will show next week at the RSA Conference.
7 Deadly Sins That Get Users Hacked
Slideshows  |  4/16/2015  | 
How users and their endpoints are leveraged by the bad guys to eventually find their way to critical data
Breach Defense Playbook
Partner Perspectives  |  4/16/2015  | 
How to be smart about defending against your next attack.
Microsoft Zero-Day Bug Being Exploited In The Wild
News  |  4/16/2015  | 
As attacks mount, and over 70 million websites remain vulnerable, advice is "fix now."
Harnessing The Power Of Cyber Threat Intelligence
Commentary  |  4/16/2015  | 
Here are six real-world examples of how changing your modus operandi from reactive to proactive can drive rapid response to the threats that matter.
How Ionic Says It Makes Data Breaches Irrelevant
News  |  4/15/2015  | 
Ionic Security goes public with a data security platform that manages trillions of encryption keys and enables a user to sign each pixel with its own unique key.
HackerOne Now Offers Bounties For New Bug Discovery Tools And Techniques
News  |  4/15/2015  | 
Tools are a more cost-efficient option for finding bugs in mature products, new research shows.
Predictive Analytics: The Future Is Now
Partner Perspectives  |  4/15/2015  | 
Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest stages.
Youth, Apathy, And Salary Dictate Mobile Threats To Business
News  |  4/15/2015  | 
Mobile cyberattacks may not be a thing today, but a new study shows how vulnerable businesses are via user smartphones and tablets.
Why Standardized Threat Data Will Help Stop the Next Big Breach
Commentary  |  4/15/2015  | 
Adopting industry standards for threat intelligence will reduce a lot of the heavy lifting and free cyber security first responders to focus on what they do best.
'APT-On-APT' Action
News  |  4/14/2015  | 
New spin on the cyber espionage attack: spies hacking other spies for information.
Threat Intelligence Is a Two-Way Street
Partner Perspectives  |  4/14/2015  | 
Intelligence analysis should be looked upon as less of a service and more of a partnership.
Authorities Take Down Malware-Distributing Simda Botnet
News  |  4/14/2015  | 
Fourteen C&Cs dismantled to take out nerve center of a botnet that spanned 190 countries.
Police Pay Off Ransomware Operators, Again
News  |  4/14/2015  | 
Law enforcement agencies are proving to be easy marks -- but are they any worse than the rest of us?
Botnet to Cybersecurity: Catch Me If You Can
Partner Perspectives  |  4/14/2015  | 
Tracking and disrupting the crime ring behind a polymorphic botnet.
Setting Security Professionals Up For Success
Commentary  |  4/14/2015  | 
People, process, and technology are all integral to a successful infosec program. What’s too often missing involves the concept of workflow.
Verizon DBIR: Mobile Devices Not A Factor In Real-World Attacks
News  |  4/14/2015  | 
New annual Verizon Data Breach Investigations Report shows most attacks affect a secondary victim, the average cost of a data breach is just 58 cents per stolen record -- and attackers are not going after mobile en masse.
Chinese Nation-State Hackers Give Up Attack Campaign
News  |  4/13/2015  | 
It worked on Hurricane Panda. Can APT30 and other organized cyberespionage groups also be convinced that an attack campaign isn't worth the trouble?
Majority Of Organizations Unprepared For Insider Attacks
News  |  4/13/2015  | 
SANS report shows gaps in insider detection and response.
Better Together: Network Operations & Infosec
Commentary  |  4/13/2015  | 
Getting networking and information security teams together in the same room is a critical step for companies that want to build a continuous information security culture.
New Security Flaw Spans All Versions Of Windows
News  |  4/13/2015  | 
Newly found 'forever-day' vulnerability affects 31 popular software programs including applications from Adobe, Apple, Microsoft, Symantec -- and Windows 10 preview.
Apple Patches 'Darwin Nuke,' Other Security Flaws With New OS Releases
News  |  4/10/2015  | 
Denial-of-service flaw discovered by researchers at Kaspersky Lab could affect Apple users' corporate networks.
Insider Threats: Focus On The User, Not The Data
Commentary  |  4/10/2015  | 
Global cybersecurity spending will hit almost $77 billion in 2015, so why are there more high-profile leaks than ever?
Utilities And Education The Most Bot-Infested Sectors
News  |  4/9/2015  | 
The more bots in-house, the more a company is likely to have reported a data breach, BitSight report finds.
Beebone Botnet Taken Down By Another Security Team-Up
News  |  4/9/2015  | 
Small in scale, but high in sophistication, the Beebone botnet and polymorphic downloader is disrupted by an international, public-private effort.
Solving the Right Problem: Stop Adversaries, Not Just Their Tools
Commentary  |  4/9/2015  | 
A malware-centric strategy is mere child’s play against today’s sophisticated adversaries. Here’s why.
AlienSpy A More Sophisticated Version Of The Same Old RATs
News  |  4/8/2015  | 
The AlienSpy remote access Trojan bears a resemblance to Frutas, Adwind, and Unrecom, say researchers at Fidelis.
Russian Hackers Breached White House Via US State Department
News  |  4/8/2015  | 
Attackers who recently breached the US State Department compromised an unclassified White House system by sending spearphishing messages from a hijacked State Department email account, officials say.
5 Reasons You 'Better Call Saul' To Protect Corporate Data
Commentary  |  4/8/2015  | 
These pop-culture lessons from the entertaining Breaking Bad spinoff will make security awareness training both fun and effective.
Some of the Best Things in Security Are Free
Partner Perspectives  |  4/8/2015  | 
Software tools are available from our consultants free of charge.
Cyber War Games: Top 3 Lessons Learned About Incident Response
News  |  4/7/2015  | 
Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.
3 Internet Of Things Devices That Threaten More Than Your Data
News  |  4/7/2015  | 
Veracode study of IoT devices show how vulnerabilities in our always-on households can have dire real-world consequences.
So, You 'Don’t Believe In' Security Education?
Commentary  |  4/7/2015  | 
You're in the minority for a reason. Here's why.
Containing Security
Partner Perspectives  |  4/7/2015  | 
How to identify the appropriate security for your container-based virtual applications.
What Happens When Personal Information Hits The Dark Web
News  |  4/7/2015  | 
Experiment tracked the journey of a cache of phony names, SSNs, credit cards, and other personal information.
3 Of 4 Global 2000 Companies Still Vulnerable To Heartbleed
News  |  4/7/2015  | 
Largest companies on Earth might have patched, but haven't done their due diligence with revoking and issuing new certificates, says Venafi.
Could Security Concerns Scuttle M&A And Investment Deals?
News  |  4/6/2015  | 
Questions of investor notification of Slack breach prior to signing shows how important security posture will be in vetting future deals.
Car-Hacking Prototype Passes Crash Test
News  |  4/6/2015  | 
Sensor-based technology--with military drone roots--created to detect and automatically stop cyberattacks on cars.
Obama’s War On Hackers
Commentary  |  4/6/2015  | 
Cybersecurity legislation, for the most part, is a good idea. But not without protections for bug bounty programs and other vital, proactive security research.
Principles of Malware Sinkholing
Partner Perspectives  |  4/6/2015  | 
The process of sinkholing is an important tool to have in your arsenal when dealing with emerging threats.
The Good & Bad Of BYOD
Commentary  |  4/3/2015  | 
BYOD has very little to do with technology and everything to do with security, organizational politics, and human psychology.
Google Spat With Chinese Firm Highlights Digital Certificate Security Challenges
News  |  4/3/2015  | 
Chrome will no longer trust certs issued by CNNIC following recent snafu, and Mozilla Firefox will revoke certs issued by the Chinese authority before April 1.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5361
Published: 2015-04-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Landesk Management Suite 9.6 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) start, (2) stop, or (3) restart services via a request to remote/serverServices.aspx.

CVE-2014-5370
Published: 2015-04-21
Directory traversal vulnerability in the CFChart servlet (com.naryx.tagfusion.cfm.cfchartServlet) in New Atlanta BlueDragon before 7.1.1.18527 allows remote attackers to read or possibly delete arbitrary files via a .. (dot dot) in the QUERY_STRING to cfchart.cfchart.

CVE-2015-1701
Published: 2015-04-21
Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015.

CVE-2015-2041
Published: 2015-04-21
net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

CVE-2015-2042
Published: 2015-04-21
net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.