7 Real-Life Dangers That Threaten Cybersecurity
2018 Hacker Kids Gift Guide
7 Holiday Security Tips for Retailers
Cloud, China, Generic Malware Top Security Concerns for 2019
Understanding Evil Twin AP Attacks and How to Prevent Them
News & Commentary
'Dr. Shifro' Prescribes Fake Ransomware Cure
Dark Reading Staff, Quick Hits
A Russian firm aims to capitalize on ransomware victims' desperation by offering to unlock files then passing money to attackers.
By Dark Reading Staff , 12/10/2018
Comment0 comments  |  Read  |  Post a Comment
6 Cloud Security Predictions for 2019
Ory Segal, CTO, PureSecCommentary
How the fast pace of cloud computing adoption in 2018 will dramatically change the security landscape next year.
By Ory Segal CTO, PureSec, 12/10/2018
Comment0 comments  |  Read  |  Post a Comment
6 CISO Resolutions for 2019
Ericka Chickowski, Contributing Writer, Dark Reading
The ultimate to-do list for ambitious security leaders.
By Ericka Chickowski Contributing Writer, Dark Reading, 12/10/2018
Comment1 Comment  |  Read  |  Post a Comment
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher demonstrates how attackers could steal data from smartphones while they're charging.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/8/2018
Comment1 Comment  |  Read  |  Post a Comment
Criminals Use Locally Connected Devices to Attack, Loot Banks
Jai Vijayan, Freelance writerNews
Tens of millions of dollars stolen from at least eight banks in East Europe, Kasperksy Lab says.
By Jai Vijayan Freelance writer, 12/7/2018
Comment1 Comment  |  Read  |  Post a Comment
'Simplify Everything': Google Talks Container Security in 2019
Kelly Sheridan, Staff Editor, Dark ReadingNews
Google Cloud's container security lead shares predictions, best practices, and what's top of mind for customers.
By Kelly Sheridan Staff Editor, Dark Reading, 12/7/2018
Comment0 comments  |  Read  |  Post a Comment
Iranian Nationals Charged for Atlanta Ransomware Attack
Dark Reading Staff, Quick Hits
The March attack used SamSam ransomware to infect 3,789 computers.
By Dark Reading Staff , 12/7/2018
Comment0 comments  |  Read  |  Post a Comment
Kubernetes Deployments Around the World Show Vulnerabilities
Dark Reading Staff, Quick Hits
Kubernetes owners who expose APIs to the Internet are leaving their systems open to hackers.
By Dark Reading Staff , 12/7/2018
Comment0 comments  |  Read  |  Post a Comment
Insider Threats & Insider Objections
Richard Ford, Chief Scientist, ForcepointCommentary
The tyranny of the urgent and three other reasons why its hard for CISOs to establish a robust insider threat prevention program.
By Richard Ford Chief Scientist, Forcepoint, 12/7/2018
Comment0 comments  |  Read  |  Post a Comment
Kubernetes Vulnerability Hits Top of Severity Scale
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The security issue strikes at some of the basic reasons for the rising popularity of containers as an architecture and Kubernetes as an orchestration mechanism.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Adobe Flash Zero-Day Spreads via Office Docs
Kelly Sheridan, Staff Editor, Dark ReadingNews
Adobe has patched a zero-day in its Flash player after attackers leveraged the exploit in an active campaign.
By Kelly Sheridan Staff Editor, Dark Reading, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Bringing Compliance into the SecDevOps Process
Joe Ward, Senior Security Analyst, Bishop FoxCommentary
Application security should be guided by its responsibility to maintain the confidentiality, integrity, and availability of systems and data. But often, compliance clouds the picture.
By Joe Ward Senior Security Analyst, Bishop Fox, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
4 Lessons Die Hard Teaches About Combating Cyber Villains
Keith Graham, Chief Technology Officer, SecureAuthCommentary
With proper planning, modern approaches, and tools, we can all be heroes in the epic battle against the cyber threat.
By Keith Graham Chief Technology Officer, SecureAuth, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Apple Issues Security Fixes Across Mac, iOS
Dark Reading Staff, Quick Hits
Software updates for Mac and iOS bring patches to Safari, iCloud, iTunes on Windows, and tvOS.
By Dark Reading Staff , 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
55% of Companies Don't Offer Mandatory Security Awareness Training
Dark Reading Staff, Quick Hits
Even those that provide employee training do so sparingly, a new study finds.
By Dark Reading Staff , 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
7 Common Breach Disclosure Mistakes
Jai Vijayan, Freelance writer
How you report a data breach can have a big impact on its fallout.
By Jai Vijayan Freelance writer, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Evidence in Starwood/Marriott Breach May Point to China
Dark Reading Staff, Quick Hits
Attackers used methods, tools previously used by known Chinese hackers.
By Dark Reading Staff , 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Boosting SOC IQ Levels with Knowledge Transfer
Mike Fowler, Vice President of Professional Services at DFLabsCommentary
Despite shortages of skills and staff, these six best practices can improve analysts' performance in a security operations center.
By Mike Fowler Vice President of Professional Services at DFLabs, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Symantec Intros USB Scanning Tool for ICS Operators
Jai Vijayan, Freelance writerNews
ICSP Neural is designed to address USB-borne malware threats.
By Jai Vijayan Freelance writer, 12/5/2018
Comment1 Comment  |  Read  |  Post a Comment
Toyota Builds Open-Source Car-Hacking Tool
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
PASTA testing platform specs will be shared via open-source.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/5/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Agent Aix les Bains
Current Conversations What do you mean ?
In reply to: Re: BLOCKCHAIN
Post Your Own Reply
More Conversations
PR Newswire
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Symantec Intros USB Scanning Tool for ICS Operators
Jai Vijayan, Freelance writer,  12/5/2018
Register for Dark Reading Newsletters
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I guess this answers the question: who's watching the watchers?
White Papers
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3988
PUBLISHED: 2018-12-10
Signal Messenger for Android 4.24.8 may expose private information when using "disappearing messages." If a user uses the photo feature available in the "attach file" menu, then Signal will leave the picture in its own cache directory, which is available to any application on the...
CVE-2018-10008
PUBLISHED: 2018-12-10
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended...
CVE-2018-10008
PUBLISHED: 2018-12-10
An information exposure vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in DirectoryBrowserSupport.java that allows attackers with the ability to control build output to browse the file system on agents running builds beyond the duration of the build using the workspace br...
CVE-2018-10008
PUBLISHED: 2018-12-10
A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jen...
CVE-2018-10008
PUBLISHED: 2018-12-10
A denial of service vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.
Flash Poll
Video
Slideshows
Twitter Feed