Dark Reading Radio: Where Do Security Startups Come From?
New GameoverZeuS Variant Found In The Wild
6 Things That Stink About SSL
Facebook Helps Cripple Greek Botnet
6 Tips for Using Big Data to Hunt Cyberthreats
News & Commentary
3 Out of 4 Employees Pose a Security Risk
Steve Zurier, Freelance WriterNews
New MediaPRO study also finds that management performed worse than entry- and mid-level employees in how to handle a suspected phishing email.
By Steve Zurier Freelance Writer, 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
DoD Travel System Breach Exposed Data of 30K Civilian, Military Employees
Dark Reading Staff, Quick Hits
Defense Dept. says contractor that handles travel management services was hacked.
By Dark Reading Staff , 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
4 Ways to Fight the Email Security Threat
Asaf Cidon, Vice President, Content Security Services, at Barracuda NetworksCommentary
It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.
By Asaf Cidon Vice President, Content Security Services, at Barracuda Networks, 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
Most IT Security Pros Want to Change Jobs
Dark Reading Staff, Quick Hits
They cite five main reasons for wanting to move on and what it would take to retain them.
By Dark Reading Staff , 10/12/2018
Comment2 comments  |  Read  |  Post a Comment
Facebook Update: 30 Million Users Actually Hit in its Recent Breach
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
The good news: That number is less than the original estimate of 50 million. The bad news: It might not have been the only attack.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/12/2018
Comment0 comments  |  Read  |  Post a Comment
Threat Hunters & Security Analysts: A Dynamic Duo
Rick Costanzo, CEO, RANK SoftwareCommentary
Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.
By Rick Costanzo CEO, RANK Software, 10/12/2018
Comment1 Comment  |  Read  |  Post a Comment
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
By Steve Zurier Freelance Writer, 10/12/2018
Comment2 comments  |  Read  |  Post a Comment
Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Many organizations have yet to create an effective cybersecurity strategy and it's costing them millions.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 10/11/2018
Comment1 Comment  |  Read  |  Post a Comment
Chinese Intelligence Officer Under Arrest for Trade Secret Theft
Jai Vijayan, Freelance writerNews
Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.
By Jai Vijayan Freelance writer, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Window Snyder Shares Her Plans for Intel Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.
By Kelly Sheridan Staff Editor, Dark Reading, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Most Malware Arrives Via Email
Dark Reading Staff, Quick Hits
Watch out for messages with the word "invoice" in the subject line, too.
By Dark Reading Staff , 10/11/2018
Comment1 Comment  |  Read  |  Post a Comment
Google Adds New Identity, Security Tools to Cloud Platform
Kelly Sheridan, Staff Editor, Dark ReadingNews
A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.
By Kelly Sheridan Staff Editor, Dark Reading, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Not All Multifactor Authentication Is Created Equal
Alexandre Cagnoni, Director of Authentication at WatchGuard TechnologiesCommentary
Users should be aware of the strengths and weaknesses of the various MFA methods.
By Alexandre Cagnoni Director of Authentication at WatchGuard Technologies, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
One-Third of US Adults Hit with Identity Theft
Dark Reading Staff, Quick Hits
That's double the global average and more than three times the rate of French and German adults.
By Dark Reading Staff , 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
The Better Way: Threat Analysis & IIoT Security
Satish Gannu, Chief Security Officer, ABBCommentary
Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.
By Satish Gannu Chief Security Officer, ABB, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Meet 5 Women Shaping Microsoft's Security Strategy
Kelly Sheridan, Staff Editor, Dark Reading
Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity.
By Kelly Sheridan Staff Editor, Dark Reading, 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
Russian Hacking Groups Intersect in Recent Cyberattacks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
New Threat Group Conducts Malwareless Cyber Espionage
Jai Vijayan, Freelance writerNews
Gallmaker group is relying exclusively on legitimate tools and living-off-the-land tactics to make detection very difficult.
By Jai Vijayan Freelance writer, 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
Imperva to Be Acquired by Thoma Bravo for $2.1 Billion
Dark Reading Staff, Quick Hits
But two law firms are investigating whether the security vendor breached its fiduciary duty to shareholders by not actively seeking buyers offering a higher price.
By Dark Reading Staff , 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
IIS Attacks Skyrocket, Hit 1.7M in Q2
Dark Reading Staff, Quick Hits
Drupal and Oracle WebLogic also were hit with more cyberattacks during same quarter.
By Dark Reading Staff , 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Cloud Misconceptions Are Pervasive Across Enterprises
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack. Read >>
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
White Papers
Current Issue
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18361
PUBLISHED: 2018-10-15
An issue was discovered in nc-cms through 2017-03-10. index.php?action=edit_html allows XSS via the name parameter, as demonstrated by a value beginning with home_content and containing a crafted SRC attribute of an IMG element.
CVE-2018-1744
PUBLISHED: 2018-10-15
IBM Security Key Lifecycle Manager 2.5, 2.6, 2.7, and 3.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 148423.
CVE-2018-1747
PUBLISHED: 2018-10-15
IBM Security Key Lifecycle Manager 2.5, 2.6, 2.7, and 3.0 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 148428.
CVE-2018-18324
PUBLISHED: 2018-10-15
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has XSS via the admin/fileManager2.php fm_current_dir parameter, or the admin/index.php module, service_start, service_fullstatus, service_restart, service_stop, or file (within the file_editor) parameter.
CVE-2018-18322
PUBLISHED: 2018-10-15
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has Command Injection via shell metacharacters in the admin/index.php service_start, service_restart, service_fullstatus, or service_stop parameter.
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Flash Poll
Video
Slideshows
Twitter Feed