News & Commentary
Latest Content tagged with Risk
Page 1 / 2   >   >>
Dark Reading Launches New Conference on Cyber Defense
Commentary  |  6/21/2017  | 
November event will focus on attendee interaction, "blue team" best practices
Cyber Insurance: Read the Fine Print!
Partner Perspectives  |  6/15/2017  | 
Applying for insurance is a grueling process involving detailed questionnaires and lengthy technical interviews that can still leave you without an adequate safety net.
By the Numbers: Parsing the Cybersecurity Challenge
Commentary  |  6/14/2017  | 
Why your CEO should rethink company security priorities in the drive for digital business growth.
Europol Operation Busts Payment Card Identity Theft Ring
News  |  6/13/2017  | 
Members of an international crime ring of payment card skimmers who stole more than $500,000 were arrested by a joint multi-national law enforcement operation.
Businesses Spend 1,156 Hours Per Week on Endpoint Security
News  |  6/13/2017  | 
Insecure endpoints cost businesses millions of dollars, and hours of productivity, as they struggle to detect and contain threats.
Ditch the Big Ass Spreadsheet with Continuous Security Compliance
Partner Perspectives  |  6/13/2017  | 
Replacing outdated spreadsheets with automated, continuous monitoring reduces workload and increases reliability, making compliance easy.
Security in the Cloud: Pitfalls and Potential of CASB Systems
News  |  6/7/2017  | 
The transition to cloud has driven a demand for CASB systems, but today's systems lack the full breadth of functionality businesses need.
Cybersecurity Stands as Big Sticking Point in Software M&A
News  |  6/7/2017  | 
The breach that was the fly in the ointment of the Yahoo-Verizon deal is one of many now surfacing as security of acquired firms starts to become a point of negotiation.
Sensitive DoD Data Discovered on Unprotected Server
Quick Hits  |  6/1/2017  | 
Researcher found unsecured repository of 60,000 documents of sensitive US data on a publicly exposed Amazon Web Services "S3" bucket used by government contractor Booz Allen Hamilton.
SMB Security: Dont Leave the Smaller Companies Behind
Commentary  |  6/1/2017  | 
Helping improve the security posture of small and medium-sized businesses should be a priority for security organizations of all sizes.
Cybersecurity Insurance Lacking at 50% of US Companies
Quick Hits  |  5/31/2017  | 
While half of US security professionals say their companies passed on cybersecurity insurance, the figure is far higher in healthcare, according to a survey released today.
Mobile App Back-End Servers, Databases at Risk
News  |  5/31/2017  | 
Mobile app developers'casual use of back-end technology like Elasticsearch without security-hardening puts unsuspecting enterprises at grave risk of exposure.
Securing the Human a Full-Time Commitment
News  |  5/30/2017  | 
Encouraging the people in your organization to make safer cyber decisions requires dedicated brainpower to pull off, SANS study shows.
Data Security & Privacy: The Risks of Not Playing by the Rules
Commentary  |  5/24/2017  | 
Achieving compliance is a complex and challenging process. But with the right systems and policies, you can stay ahead of the next data breach and the regulators.
Target Reaches Breach Settlement: $18.5 Million Fine, Security Controls
News  |  5/24/2017  | 
Target to cough up $18.5 million to 47 states in a settlement following its 2013 security breach, which exposed data of millions of customers.
9 Ways Organizations Sabotage Their Own Security: Lessons from the Verizon DBIR
Slideshows  |  5/23/2017  | 
Mistakes and missteps plague enterprise security. The Verizon 2017 Data Breach Investigations Report (DBIR) offers nuggets on what organizations must stop doing now.
5 Security Lessons WannaCry Taught Us the Hard Way
News  |  5/18/2017  | 
There is a lot more our industry should be doing to protect its systems and data from cyber blackmail.
Survey: Unpatched Windows OS on the Rise
Quick Hits  |  5/17/2017  | 
Despite the rise in vulnerabilities, the percentage of unpatched Windows operating systems grew in the first quarter compared to the previous year.
DocuSign's Brand Used in Phishing Attacks
Quick Hits  |  5/16/2017  | 
The electronic signature company issued an update alert today that it noticed a rise in phishing attacks last week and this morning.
The Wide-Ranging Impact of New York's Cybersecurity Regulations
Commentary  |  5/16/2017  | 
New York's toughest regulations yet are now in effect. Here's what that means for your company.
Study: Rooted Androids, Jailbroken iPhones Found in Enterprises
News  |  5/16/2017  | 
A study released today gives greater insight into some of the worst fears for security pros trying to manage employees' BYOD mobile phones.
Majority of CEOs Knowingly Raise Risk Level With Their Shadow IT
News  |  5/16/2017  | 
Despite the increased risk shadow IT poses to security, a majority of CEOs surveyed say they are willing to take the risk, according to a survey released today.
Researchers Investigate Possible Connection Between WannaCry & North Korean Hacker Group
News  |  5/15/2017  | 
Google, Kaspersky Lab and Symantec all have found common code in the WannaCry malware and that of the nation-state hackers behind the mega breach of Sony.
Breaches Can Crater Companies' Stock by 5%
Quick Hits  |  5/15/2017  | 
New Ponemon study shows how breaches can bring a company's stock price down by an average of 5% on the day of the incident.
Your Grandma Could Be the Next Ransomware Millionaire
Commentary  |  5/15/2017  | 
Today's as-a-service technology has democratized ransomware, offering practically anyone with a computer and an Internet connection an easy way to get in on the game.
'WannaCry' Rapidly Moving Ransomware Attack Spreads to 74 Countries
News  |  5/12/2017  | 
A wave of ransomware infections took down a wide swath of UK hospitals and is rapidly moving across the globe.
8 Notorious Russian Hackers Arrested in the Past 8 Years
Slideshows  |  5/12/2017  | 
Lesson learned by Russian cybercriminals: Don't go on vacation, it's bad for your freedom to scam.
'Systemic' Cyberattack Most Likely to Hit Financial, Energy Sectors
Quick Hits  |  5/10/2017  | 
The financial services industry is among the top five industries that likely face a systemic cyberattack, according to a survey released today.
Hackers Face $8.9 Million Fine for Law Firm Breaches
Quick Hits  |  5/9/2017  | 
A federal court orders three Chinese nationals to pay $8.9 million in fines and penalties for hacking into two law firms and using stolen confidential information to trade stocks.
10 Free or Low-Cost Security Tools
Slideshows  |  5/9/2017  | 
At a time when many organizations struggle with security funding, open-source tools can help cut costs for certain businesses.
Aflac CISO: Insurance Sector Ramps Up Cyber Defenses
News  |  5/8/2017  | 
Aflac CISO Tim Callahan discusses ongoing initiatives to stay secure as hackers ramp up attacks on financial services.
DHS Report Outlines Feds' Mobile Security Threats
Quick Hits  |  5/8/2017  | 
The US Department of Homeland Security sent Congress a study on mobile security threats facing federal government workers as well as recommendations for protection.
Midsize Businesses Prove Easy Attack Targets
News  |  5/4/2017  | 
Basic security practices could protect small- to midsized businesses from cybercriminals looking for low-risk, high-reward targets.
Small Budgets Cripple Cybersecurity Efforts of Local Governments
Quick Hits  |  5/3/2017  | 
A survey of local government chief information officers finds that insufficient funding for cybersecurity is the biggest obstacle in achieving high levels of cyber safety.
7 Steps to Fight Ransomware
Commentary  |  5/3/2017  | 
Perpetrators are shifting to more specific targets. This means companies must strengthen their defenses, and these strategies can help.
Healthcare Breaches Hit All-Time High in 2016
News  |  5/3/2017  | 
More than 300 healthcare businesses reported data breaches in 2016, but a drop in leaked records put fewer Americans at risk.
Striving For Improvement on World Password Day
News  |  5/2/2017  | 
Consumer hygiene and poor authentication practices create toxic combo.
Intel Patches 'Critical' Elevation Privilege Bug in High-End Chips
Quick Hits  |  5/2/2017  | 
Semiconductor giant releases patch for its Intel Active Management Technology vulnerability that could allow an attacker to escalate privileges in its high-end chipsets.
New Global Resilience Federation Will Share Threat Intel Across Industries
Quick Hits  |  5/2/2017  | 
Born out of a partnership of information sharing and analysis centers and organizations, Global Resilience Federation launches today to share intelligence and information across a number of industry sectors.
The Cyber-Committed CEO & Board
Commentary  |  5/1/2017  | 
Here is what CISOs need to communicate to upper management about the business risks of mismanaging cybersecurity.
Cybersecurity Training Nonexistent at One-Third of SMBs
News  |  5/1/2017  | 
But nearly half of US SMBs in a new survey would be willing to participate in security awareness training at their workplace - even if it was optional.
Microsoft Updates Foreign Surveillance Request Count
Quick Hits  |  4/27/2017  | 
Microsoft received 0-499 surveillance requests from January to June 2016, correcting an earlier report stating orders spiked to 1,000-1,499.
HHS Hits CardioNet with $2.5M HIPAA Settlement Fee
Quick Hits  |  4/26/2017  | 
The US Department of Health and Human Services slapped the mobile cardiac monitoring service with fee after breach of customer health data.
4 Industries Account for Majority of Global Ransomware Attacks
Quick Hits  |  4/25/2017  | 
When it comes to 77% of global ransomware attacks, these four industries take the greatest hit, according to a global threat trends report released today.
Macron Targeted by Russian Cyber Spies
Quick Hits  |  4/24/2017  | 
France's leading presidential candidate Emmanuel Macron's campaign reportedly is being targeted by hackers ties to Russia's military intelligence arm GRU.
Nigerian Convicted in Passport Wire Fraud and Internet Scam
Quick Hits  |  4/21/2017  | 
A Nigerian man set up a number of U.S. bank accounts with bogus passports over a one year period, in which he managed to steal at least $500,000 through wire fraud and Internet scams.
Kill Chain & the Internet of Things
Commentary  |  4/20/2017  | 
IoT things such as security cameras, smart thermostats and wearables are particularly easy targets for kill chain intruders, but a layered approach to security can help thwart an attack.
Users Overshare Sensitive Enterprise Data
News  |  4/20/2017  | 
Survey finds nearly half of the employees trained to protect sensitive data engage in risky security practices.
ISC2 Issues White House Cybersecurity Executive Order Recommendations
Quick Hits  |  4/19/2017  | 
The industry trade group calls on President Trump to make workforce development a top priority when he issues the final version of the White House cybersecurity executive order.
Advanced, Low-Cost Ransomware Tools on the Rise
News  |  4/18/2017  | 
New offerings cost as little as $175 and come with lots of anti-detection bells and whistles.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
The Dark Reading Security Spending Survey
The Dark Reading Security Spending Survey
Enterprises are spending an unprecedented amount of money on IT security where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download the report and find out what they had to say.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.