Insider Sabotage among Top 3 Threats CISOs Cant yet Handle
Luana Pascu, Security Specialist, Bitdefender
These five steps can help your organizations limit the risks from disgruntled employees and user errors.
By Luana Pascu Security Specialist, Bitdefender, 3/1/2017
Comment0 comments  |  Read  |  Post a Comment
Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
A recent Bitdefender survey of 250 US IT execs in companies with 1000 or more PCs paints a disturbing picture of cybersecurity preparedness in the enterprise.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/28/2017
Comment3 comments  |  Read  |  Post a Comment
How to Secure Hyperconverged Infrastructures & Why It Is Different
Liviu Arsene, Senior E-threat Analyst, Bitdefender
The next-generation datacenter requires new security practices, but that doesnt mean everything we learned about datacenter security becomes obsolete.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/23/2017
Comment0 comments  |  Read  |  Post a Comment
Survey: 14% Of IT Execs Would Pay $500K To Avoid Shaming After A Breach
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Bitdefender report shows how negative media headlines following an attack can cause financial damage, ruin business forecasts and severely damage reputations.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/22/2017
Comment0 comments  |  Read  |  Post a Comment
Do Software-Defined Data Centers Pose Security Concerns?
Liviu Arsene, Senior E-threat Analyst, Bitdefender
SDDC adoption is likely to trigger widespread data security governance programs, with 20 percent of organizations considering them necessary to prevent data breaches.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/20/2017
Comment0 comments  |  Read  |  Post a Comment
Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Three main threats companies arent prepared to handle include outside attacks, data vulnerability and insider sabotage.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 1/31/2017
Comment1 Comment  |  Read  |  Post a Comment
Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
Liviu Arsene, Senior E-threat Analyst, Bitdefender
When protecting physical or virtual endpoints, its vital to have more than one layer of defense against malware.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/23/2017
Comment0 comments  |  Read  |  Post a Comment
What to Consider When Moving To Hyperconverged Infrastructure
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/19/2017
Comment0 comments  |  Read  |  Post a Comment
Machine Learning For Cybersecurity Not Cybercrime
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Cybercriminals have yet to adopt machine learning for offensive attack strategies - and they probably wont for a long time.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/17/2017
Comment1 Comment  |  Read  |  Post a Comment
How Machine Learning For Behavior Analytics & Anomaly Detection Speeds Mitigation
Liviu Arsene, Senior E-threat Analyst, Bitdefender
By relying on artificial intelligence to identify suspicious network activity or behavior, machine learning can adapt to both business needs and new threats.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/9/2017
Comment0 comments  |  Read  |  Post a Comment
2017 To Bring More Ransomware, IoT DDoS Attacks, And SCADA Incidents
Luana Pascu, Security Specialist, Bitdefender
As hackers begin to target corporations in an attempt to extort higher ransom fees, the threat will only become more serious.
By Luana Pascu Security Specialist, Bitdefender, 1/5/2017
Comment0 comments  |  Read  |  Post a Comment
Machine-Learning Algorithms Improve Detection Time For Modern Threats
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Artificial intelligence and machine learning are essential to combat a threat landscape that is larger and more sophisticated than ever.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 12/12/2016
Comment0 comments  |  Read  |  Post a Comment
Avalanche Cybercrime Platform Takedown Leaves A Lot To Clean Up
Bogdan Botezatu, Senior E-threat Analyst, Bitdefender
Help us wipe out the remaining bots and put an end to Avalanche once and for all.
By Bogdan Botezatu Senior E-threat Analyst, Bitdefender, 12/5/2016
Comment1 Comment  |  Read  |  Post a Comment
Job Loss And Financial Damage: CIOs Main Fears When Adopting Virtualization
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Companies arent prepared for the security challenges of hybrid infrastructures, Bitdefender study reveals.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 11/30/2016
Comment0 comments  |  Read  |  Post a Comment
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.