Cloud
News & Commentary
8 Most Overlooked Security Threats
Kelly Sheridan, Associate Editor, Dark Reading
Businesses know the obvious security threats to watch for, but some of the biggest dangers may not at top-of-mind.
By Kelly Sheridan Associate Editor, Dark Reading, 5/26/2017
Comment1 Comment  |  Read  |  Post a Comment
In the Cloud, Evolving Infrastructure Means Evolving Alliances
Mike Convertino, CISO & VP, Information Security, F5 NetworksCommentary
New opportunities make for unusual bedfellows. Here's how to navigate the shift in organizational dynamics between security operations, line-of-business managers, and developers.
By Mike Convertino CISO & VP, Information Security, F5 Networks, 5/25/2017
Comment0 comments  |  Read  |  Post a Comment
WannaCry Ransom Notes Penned by Chinese-Speaking Authors, Analysis Shows
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
But a Chinese-language link doesn't shoot down theories of the North Korean Lazarus Group's involvement in the ransomware worm attacks, say language experts at Flashpoint.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/25/2017
Comment0 comments  |  Read  |  Post a Comment
You Have One Year to Make GDPR Your Biggest Security Victory Ever
Sara Peters, Senior Editor at Dark ReadingNews
The EU's new razor-toothed data privacy law could either rip you apart or help you create the best security program you've ever had. Here's how.
By Sara Peters Senior Editor at Dark Reading, 5/25/2017
Comment2 comments  |  Read  |  Post a Comment
82% of Databases Left Unencrypted in Public Cloud
Kelly Sheridan, Associate Editor, Dark ReadingNews
Personal health information and other sensitive data is left exposed as businesses overlook encryption and network security.
By Kelly Sheridan Associate Editor, Dark Reading, 5/25/2017
Comment2 comments  |  Read  |  Post a Comment
DDoS Attacks Fell 23% in First Quarter, Grew in Size
Dark Reading Staff, Quick Hits
Although the number of DDoS attacks dropped in the first three months of the year, the average size of each attack grew, according to a Verisign report released Tuesday.
By Dark Reading Staff , 5/24/2017
Comment2 comments  |  Read  |  Post a Comment
Out of the Box Network Security Solutions
Emily Johnson, Digital Content Editor, InformationWeekCommentaryVideo
Portnox CEO Ofer Amitai stops by the InformationWeek News Desk
By Emily Johnson Digital Content Editor, InformationWeek, 5/23/2017
Comment0 comments  |  Read  |  Post a Comment
Trump Issues Previously Delayed Cybersecurity Executive Order
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
EO calls for immediate review of federal agencies' security postures, adoption of the NIST Framework, and a focus on critical infrastructure security.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/11/2017
Comment0 comments  |  Read  |  Post a Comment
Shining a Light on Securitys Grey Areas: Process, People, Technology
John Brenberg, Information Security & Compliance Manager, 3MCommentary
The changing distributed and mobile business landscape brings with it new security and privacy risks. Heres how to meet the challenge.
By John Brenberg Information Security & Compliance Manager, 3M, 5/9/2017
Comment0 comments  |  Read  |  Post a Comment
Google Docs Phishing Scam a Game Changer
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Experts expect copycats that take advantage of passive authentication from third-party applications using standards such as OAuth.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/4/2017
Comment3 comments  |  Read  |  Post a Comment
Google Docs Phishing Attack Abuses Legitimate Third-Party Sharing
Dark Reading Staff, Quick Hits
Phishing messages appear nearly identical to legitimate requests to share Google documents, because in many ways, they are.
By Dark Reading Staff , 5/3/2017
Comment0 comments  |  Read  |  Post a Comment
10 Questions To Get Practical Answers At Interop ITX
Dark Reading Staff, Commentary
May 15-19 in Las Vegas: How to get solutions and advice from top speakers for the things that you really want to know.
By Dark Reading Staff , 4/14/2017
Comment0 comments  |  Read  |  Post a Comment
The Long Slog To Getting Encryption Right
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Encryption practices have improved dramatically over the last 10 years, but most organizations still don't have enterprise-wide crypto strategies.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/14/2017
Comment1 Comment  |  Read  |  Post a Comment
How Innovative Companies Lock Down Data
Justin Somaini, Chief Security Officer, SAPCommentary
A mix of back-to-basics security and a set of new, data-centric best practices is key to defending against a future of growing and sophisticated cyberattacks.
By Justin Somaini , 4/12/2017
Comment0 comments  |  Read  |  Post a Comment
Forget the Tax Man: Time for a DNS Security Audit
Ericka Chickowski, Contributing Writer, Dark Reading
Here's a 5-step DNS security review process that's not too scary and will help ensure your site availability and improve user experience.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/11/2017
Comment0 comments  |  Read  |  Post a Comment
UK Loan Firm Wonga Suffers Financial Data Breach
Dark Reading Staff, Quick Hits
Customers in the UK and Poland may have had their bank account details compromised.
By Dark Reading Staff , 4/11/2017
Comment1 Comment  |  Read  |  Post a Comment
The New Shadow IT: Custom Data Center Applications
Kaushik Narayan, CTO, Skyhigh NetworksCommentary
If you think youve finally gotten control of unsanctioned user apps, think again. The next wave of rogue apps is on its way from your data center to the cloud.
By Kaushik Narayan CTO, Skyhigh Networks, 4/7/2017
Comment3 comments  |  Read  |  Post a Comment
As Cloud Use Expands, So Do Security Blind Spots, Studies Show
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Three-quarters of IaaS and SaaS apps arent monitored.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/4/2017
Comment2 comments  |  Read  |  Post a Comment
Cybercriminals Seized Control of Brazilian Bank for 5 Hours
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Sophisticated heist compromised major bank's entire DNS infrastructure.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/4/2017
Comment0 comments  |  Read  |  Post a Comment
The Business of Security: How your Organization Is Changing beneath You
John B. Dickson, CISSP,  Principal, Denim GroupCommentary
And why its your job to change with it and skate where the puck is headed.
By John B. Dickson CISSP, Principal, Denim Group, 3/30/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Joe Stanganelli
Current Conversations "I think we should hire this one."
In reply to: ntt4
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.