Insider Sabotage among Top 3 Threats CISOs Cant yet Handle
Luana Pascu, Security Specialist, Bitdefender
These five steps can help your organizations limit the risks from disgruntled employees and user errors.
By Luana Pascu Security Specialist, Bitdefender, 3/1/2017
Comment0 comments  |  Read  |  Post a Comment
Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
A recent Bitdefender survey of 250 US IT execs in companies with 1000 or more PCs paints a disturbing picture of cybersecurity preparedness in the enterprise.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/28/2017
Comment3 comments  |  Read  |  Post a Comment
How to Secure Hyperconverged Infrastructures & Why It Is Different
Liviu Arsene, Senior E-threat Analyst, Bitdefender
The next-generation datacenter requires new security practices, but that doesnt mean everything we learned about datacenter security becomes obsolete.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/23/2017
Comment0 comments  |  Read  |  Post a Comment
Survey: 14% Of IT Execs Would Pay $500K To Avoid Shaming After A Breach
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Bitdefender report shows how negative media headlines following an attack can cause financial damage, ruin business forecasts and severely damage reputations.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/22/2017
Comment0 comments  |  Read  |  Post a Comment
Do Software-Defined Data Centers Pose Security Concerns?
Liviu Arsene, Senior E-threat Analyst, Bitdefender
SDDC adoption is likely to trigger widespread data security governance programs, with 20 percent of organizations considering them necessary to prevent data breaches.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/20/2017
Comment0 comments  |  Read  |  Post a Comment
Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Three main threats companies arent prepared to handle include outside attacks, data vulnerability and insider sabotage.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 1/31/2017
Comment1 Comment  |  Read  |  Post a Comment
Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
Liviu Arsene, Senior E-threat Analyst, Bitdefender
When protecting physical or virtual endpoints, its vital to have more than one layer of defense against malware.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/23/2017
Comment0 comments  |  Read  |  Post a Comment
What to Consider When Moving To Hyperconverged Infrastructure
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/19/2017
Comment0 comments  |  Read  |  Post a Comment
Machine Learning For Cybersecurity Not Cybercrime
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Cybercriminals have yet to adopt machine learning for offensive attack strategies - and they probably wont for a long time.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/17/2017
Comment1 Comment  |  Read  |  Post a Comment
How Machine Learning For Behavior Analytics & Anomaly Detection Speeds Mitigation
Liviu Arsene, Senior E-threat Analyst, Bitdefender
By relying on artificial intelligence to identify suspicious network activity or behavior, machine learning can adapt to both business needs and new threats.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/9/2017
Comment0 comments  |  Read  |  Post a Comment
2017 To Bring More Ransomware, IoT DDoS Attacks, And SCADA Incidents
Luana Pascu, Security Specialist, Bitdefender
As hackers begin to target corporations in an attempt to extort higher ransom fees, the threat will only become more serious.
By Luana Pascu Security Specialist, Bitdefender, 1/5/2017
Comment0 comments  |  Read  |  Post a Comment
Machine-Learning Algorithms Improve Detection Time For Modern Threats
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Artificial intelligence and machine learning are essential to combat a threat landscape that is larger and more sophisticated than ever.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 12/12/2016
Comment0 comments  |  Read  |  Post a Comment
Avalanche Cybercrime Platform Takedown Leaves A Lot To Clean Up
Bogdan Botezatu, Senior E-threat Analyst, Bitdefender
Help us wipe out the remaining bots and put an end to Avalanche once and for all.
By Bogdan Botezatu Senior E-threat Analyst, Bitdefender, 12/5/2016
Comment1 Comment  |  Read  |  Post a Comment
Job Loss And Financial Damage: CIOs Main Fears When Adopting Virtualization
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Companies arent prepared for the security challenges of hybrid infrastructures, Bitdefender study reveals.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 11/30/2016
Comment0 comments  |  Read  |  Post a Comment
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
New Mirai Version Targets Business IoT Devices
Dark Reading Staff 3/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Reading Schneier's Friday Squid Blog again?
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.