Lets Get Smarter About Security By Working Together
Rick McElroy, Security Strategist, Carbon BlackCommentary
We all need help, and only by working together can we move the needle on security.
By Rick McElroy Security Strategist, Carbon Black, 9/13/2016
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Self-Esteem: 4 Things Confident Teams Are Doing
Ben Johnson, Cofounder & Chief Security Strategist, Carbon BlackCommentary
By increasing our cybersecurity self-esteem, we can truly make a difference in raising our collective cybersecurity resiliency.
By Ben Johnson Cofounder & Chief Security Strategist, Carbon Black, 8/31/2016
Comment0 comments  |  Read  |  Post a Comment
How the Adoption of EDR Transforms a SOCs Effectiveness
John Markott, Director of Product Management, Carbon BlackCommentary
Endpoint detection response is helping take the headache out of responding to threats by providing visibility where most organizations are blind.
By John Markott Director of Product Management, Carbon Black, 8/2/2016
Comment0 comments  |  Read  |  Post a Comment
Saving The Security Operations Center With Endpoint Detection And Response
John Markott, Director of Product Management, Carbon BlackCommentary
EDR is the beginning of our return to control in the fight against cybercrime.
By John Markott Director of Product Management, Carbon Black, 7/11/2016
Comment1 Comment  |  Read  |  Post a Comment
Shifting The Economic Balance Of Cyberattacks
Ben Johnson, Cofounder & Chief Security Strategist, Carbon BlackCommentary
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.
By Ben Johnson Cofounder & Chief Security Strategist, Carbon Black, 6/27/2016
Comment1 Comment  |  Read  |  Post a Comment
A Real World Analogy For Patterns of Attack
Ben Johnson, Cofounder & Chief Security Strategist, Carbon BlackCommentary
Patterns reveal exponentially more relevant information about attempted malfeasance than singular indicators of an attack ever could.
By Ben Johnson Cofounder & Chief Security Strategist, Carbon Black, 6/20/2016
Comment0 comments  |  Read  |  Post a Comment
Patterns Of Attack Offer Exponentially More Insight Than Indicators
Ben Johnson, Cofounder & Chief Security Strategist, Carbon BlackCommentary
In the cyberworld, patterns of attack provide investigators with context and the precise sequence of events as a cybercrime unfolds.
By Ben Johnson Cofounder & Chief Security Strategist, Carbon Black, 6/13/2016
Comment1 Comment  |  Read  |  Post a Comment
DR malwarebytes Test Doc
Christopher Boyd, Malware Intelligence Analyst, MalwarebytesCommentary
DR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test DocDR malwarebytes Test Doc
By DR malwarebytes Test Doc , 5/25/2016
Comment0 comments  |  Read  |  Post a Comment
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio


darkreading : /darkreading/other : /darkreading/other