Schneider Electric: TRITON/TRISIS Attack Used 0-Day Flaw in its Safety Controller System, and a RAT
Which CISO 'Tribe' Do You Belong To?
Doh!!!  The 10 Most Overlooked Security Tasks
AI in Cybersecurity: Where We Stand & Where We Need to Go
20 Cybersecurity Vendors Getting Venture Capital Love
News & Commentary
Satori Botnet Malware Now Can Infect Even More IoT Devices
Jai Vijayan, Freelance writerNews
Latest version targets systems running ARC processors.
By Jai Vijayan Freelance writer, 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
Intel Says to Stop Applying Problematic Spectre, Meltdown Patch
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Cause of reboot problems with its Broadwell and Haswell microprocessor patching now identified, the chipmaker said.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
File Inclusion Vulns, SQL Injection Top Web Defacement Tactics
Kelly Sheridan, Associate Editor, Dark ReadingNews
Hacktivists driven by political, religious, and other causes commonly exploit basic vulnerabilities to spread their messages, researchers say.
By Kelly Sheridan Associate Editor, Dark Reading, 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
Most Companies Suffer Reputation Damage After Security Incidents
Dark Reading Staff, Quick Hits
New Kroll Annual Global Fraud & Risk Report says 86% of companies worldwide experienced security incidents and information theft and loss in the past twelve months.
By Dark Reading Staff , 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
Facebook Launches 'Secure the Internet Grants' Program
Dark Reading Staff, Quick Hits
The new initiative encourages universities, non-profits, and NGOs to submit applied research proposals for new security defense technologies that can be used in practice.
By Dark Reading Staff , 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
9 Steps to More-Effective Organizational Security
Tim Bandos, Senior Director of Cybersecurity at Digital GuardianCommentary
Too often security is seen as a barrier, but it's the only way to help protect the enterprise from threats. Here are tips on how to strengthen your framework.
By Tim Bandos Senior Director of Cybersecurity at Digital Guardian, 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
Kaspersky Lab Seeks Injunction Against US Government Ban
Jai Vijayan, Freelance writerNews
Revenues and reputation have taken a hit in the wake of the US Department of Homeland Security's decision to prohibit use of its products and services by the feds, the company says.
By Jai Vijayan Freelance writer, 1/19/2018
Comment1 Comment  |  Read  |  Post a Comment
Up to 40K Affected in Credit Card Breach at OnePlus
Dark Reading Staff, Quick Hits
The smartphone manufacturer has sent an email to anyone who may have been affected in the breach.
By Dark Reading Staff , 1/19/2018
Comment2 comments  |  Read  |  Post a Comment
Google Pays Researcher Record $112,500 for Android Flaw
Dark Reading Staff, Quick Hits
The bug bounty reward, given to a researcher who submitted a working remote exploit chain, is Google's highest for an Android bug.
By Dark Reading Staff , 1/19/2018
Comment0 comments  |  Read  |  Post a Comment
You Break It, They Buy It: Economics, Motivations Behind Bug Bounty Hunting
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Some bug hunters make 16 times the median salary of software engineers in their home countries.
By Ericka Chickowski Contributing Writer, Dark Reading, 1/19/2018
Comment1 Comment  |  Read  |  Post a Comment
Understanding Supply Chain Cyber Attacks
Liviu Arsene, Senior E-threat Analyst, BitdefenderCommentary
While the attack surface has increased exponentially because of the cloud and everything-as-a-service providers, there are still ways in which host companies can harden supply chain security.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/19/2018
Comment0 comments  |  Read  |  Post a Comment
Rogue Chrome, Firefox Extensions Hijack Browsers; Prevent Easy Removal
Jai Vijayan, Freelance writerNews
Malwarebytes describes malicious extensions as 'one of a kind'
By Jai Vijayan Freelance writer, 1/18/2018
Comment3 comments  |  Read  |  Post a Comment
BEC Attacks to Exceed $9B in 2018: Trend Micro
Kelly Sheridan, Associate Editor, Dark ReadingNews
Business email compromise is projected to skyrocket as attackers adopt sophisticated techniques to dupe their victims.
By Kelly Sheridan Associate Editor, Dark Reading, 1/18/2018
Comment1 Comment  |  Read  |  Post a Comment
Tax Reform, Cybersecurity-Style
Ben Johnson, Co-founder and CTO, Obsidian SecurityCommentary
How the security industry can be more effective and efficient by recognizing four hidden "taxes" in the buying and selling process.
By Ben Johnson Co-founder and CTO, Obsidian Security, 1/18/2018
Comment0 comments  |  Read  |  Post a Comment
Feds Team with Foreign Policy Experts to Assess US Election Security
Steve Zurier, Freelance WriterNews
Expert panel lays out potential risks for the 2018 election cycle and beyond
By Steve Zurier Freelance Writer, 1/18/2018
Comment1 Comment  |  Read  |  Post a Comment
California Predicted to Lose $329M to Cybercrime in 2018
Dark Reading Staff, Quick Hits
The Golden State will be hit hardest but New York will lose the most money per incident.
By Dark Reading Staff , 1/18/2018
Comment0 comments  |  Read  |  Post a Comment
Applying Defense-in-Depth to the Digital Battlefield
Chris Park, Chris Park, CIO, iboss
How a layered security strategy can minimize the threat and impact of a data breach.
By Chris Park Chris Park, CIO, iboss, 1/18/2018
Comment0 comments  |  Read  |  Post a Comment
How to Keep Blue Teams Happy in an Automated Security World
Jose Nazario, Director of Security Research at FastlyCommentary
The creativity and intuition of your team members must be developed and nurtured.
By Jose Nazario Director of Security Research at Fastly, 1/18/2018
Comment0 comments  |  Read  |  Post a Comment
Man Admits to Directing DDoS Attacks Across the US
Dark Reading Staff, Quick Hits
New Mexico man pleads guilty to directing cyberattacks against his prior employers, business competitors, and law enforcement agencies.
By Dark Reading Staff , 1/18/2018
Comment0 comments  |  Read  |  Post a Comment
Schneider Electric: TRITON/TRISIS Attack Used 0-Day Flaw in its Safety Controller System, and a RAT
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
ICS/SCADA vendor discloses in-depth analysis of a recent targeted attack against one of its customers.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/18/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Kaspersky Lab Seeks Injunction Against US Government Ban
Jai Vijayan, Freelance writer,  1/19/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Can Machine Learning Outsmart Malware?
Using machine learning in the cybersecurity domain is a growing trend with many advantages, but it also has its risks. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack. Read >>
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
Cartoon
White Papers
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Flash Poll
Video
Slideshows
Twitter Feed