Schneider Electric: TRITON/TRISIS Attack Used 0-Day Flaw in its Safety Controller System, and a RAT
Which CISO 'Tribe' Do You Belong To?
Doh!!!  The 10 Most Overlooked Security Tasks
AI in Cybersecurity: Where We Stand & Where We Need to Go
20 Cybersecurity Vendors Getting Venture Capital Love
News & Commentary
10 Costs Your Cyber Insurance Policy May Not Cover
Kelly Sheridan, Associate Editor, Dark Reading
All the things you might think are covered but that don't actually fall under most policies.
By Kelly Sheridan Associate Editor, Dark Reading, 1/23/2018
Comment0 comments  |  Read  |  Post a Comment
Dark Caracal Campaign Breaks New Ground with Focus on Mobile Devices
Jai Vijayan, Freelance writerNews
This is the first known global-scale campaign primarily focused on stealing data from Android devices, Lookout and EFF say.
By Jai Vijayan Freelance writer, 1/23/2018
Comment0 comments  |  Read  |  Post a Comment
Fallout from Rushed Patching for Meltdown, Spectre
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Not all systems require full patching for the flaws right now, anyway, experts say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/23/2018
Comment1 Comment  |  Read  |  Post a Comment
Meltdown, Spectre Patches, Performance & My Neighbor's Sports Car
Dr. Chris Pierson, Dr. Chris Pierson, Founder & CEO, Binary Sun Cyber Risk AdvisorsCommentary
When a flaw in the engine of a data center server makes it run more like a Yugo than a Porsche, it's the lawyers who will benefit.
By Dr. Chris Pierson Dr. Chris Pierson, Founder & CEO, Binary Sun Cyber Risk Advisors, 1/23/2018
Comment0 comments  |  Read  |  Post a Comment
Less than 10% of Gmail Users Employ Two-Factor Authentication
Dark Reading Staff, Quick Hits
Google software engineer reveals lack of user adoption for stronger authentication.
By Dark Reading Staff , 1/23/2018
Comment0 comments  |  Read  |  Post a Comment
45% of Businesses Say Employees Are Biggest Security Risk
Dark Reading Staff, Quick Hits
The most common cloud security worries remain the same, with unauthorized access and malware infiltrations topping concerns.
By Dark Reading Staff , 1/23/2018
Comment1 Comment  |  Read  |  Post a Comment
5 Steps to Better Security in Hybrid Clouds
Avishai Wool, Co-Founder and CTO at AlgoSecCommentary
Following these tips can improve your security visibility and standardize management across hybrid environments.
By Avishai Wool Co-Founder and CTO at AlgoSec, 1/23/2018
Comment0 comments  |  Read  |  Post a Comment
Satori Botnet Malware Now Can Infect Even More IoT Devices
Jai Vijayan, Freelance writerNews
Latest version targets systems running ARC processors.
By Jai Vijayan Freelance writer, 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
Intel Says to Stop Applying Problematic Spectre, Meltdown Patch
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Cause of reboot problems with its Broadwell and Haswell microprocessor patching now identified, the chipmaker said.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/22/2018
Comment5 comments  |  Read  |  Post a Comment
File Inclusion Vulns, SQL Injection Top Web Defacement Tactics
Kelly Sheridan, Associate Editor, Dark ReadingNews
Hacktivists driven by political, religious, and other causes commonly exploit basic vulnerabilities to spread their messages, researchers say.
By Kelly Sheridan Associate Editor, Dark Reading, 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
Most Companies Suffer Reputation Damage After Security Incidents
Dark Reading Staff, Quick Hits
New Kroll Annual Global Fraud & Risk Report says 86% of companies worldwide experienced security incidents and information theft and loss in the past twelve months.
By Dark Reading Staff , 1/22/2018
Comment3 comments  |  Read  |  Post a Comment
Facebook Launches 'Secure the Internet Grants' Program
Dark Reading Staff, Quick Hits
The new initiative encourages universities, non-profits, and NGOs to submit applied research proposals for new security defense technologies that can be used in practice.
By Dark Reading Staff , 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
9 Steps to More-Effective Organizational Security
Tim Bandos, Senior Director of Cybersecurity at Digital GuardianCommentary
Too often security is seen as a barrier, but it's the only way to help protect the enterprise from threats. Here are tips on how to strengthen your framework.
By Tim Bandos Senior Director of Cybersecurity at Digital Guardian, 1/22/2018
Comment0 comments  |  Read  |  Post a Comment
Kaspersky Lab Seeks Injunction Against US Government Ban
Jai Vijayan, Freelance writerNews
Revenues and reputation have taken a hit in the wake of the US Department of Homeland Security's decision to prohibit use of its products and services by the feds, the company says.
By Jai Vijayan Freelance writer, 1/19/2018
Comment1 Comment  |  Read  |  Post a Comment
Up to 40K Affected in Credit Card Breach at OnePlus
Dark Reading Staff, Quick Hits
The smartphone manufacturer has sent an email to anyone who may have been affected in the breach.
By Dark Reading Staff , 1/19/2018
Comment2 comments  |  Read  |  Post a Comment
Google Pays Researcher Record $112,500 for Android Flaw
Dark Reading Staff, Quick Hits
The bug bounty reward, given to a researcher who submitted a working remote exploit chain, is Google's highest for an Android bug.
By Dark Reading Staff , 1/19/2018
Comment1 Comment  |  Read  |  Post a Comment
You Break It, They Buy It: Economics, Motivations Behind Bug Bounty Hunting
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Some bug hunters make 16 times the median salary of software engineers in their home countries.
By Ericka Chickowski Contributing Writer, Dark Reading, 1/19/2018
Comment1 Comment  |  Read  |  Post a Comment
Understanding Supply Chain Cyber Attacks
Liviu Arsene, Senior E-threat Analyst, BitdefenderCommentary
While the attack surface has increased exponentially because of the cloud and everything-as-a-service providers, there are still ways in which host companies can harden supply chain security.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/19/2018
Comment0 comments  |  Read  |  Post a Comment
Rogue Chrome, Firefox Extensions Hijack Browsers; Prevent Easy Removal
Jai Vijayan, Freelance writerNews
Malwarebytes describes malicious extensions as 'one of a kind'
By Jai Vijayan Freelance writer, 1/18/2018
Comment3 comments  |  Read  |  Post a Comment
BEC Attacks to Exceed $9B in 2018: Trend Micro
Kelly Sheridan, Associate Editor, Dark ReadingNews
Business email compromise is projected to skyrocket as attackers adopt sophisticated techniques to dupe their victims.
By Kelly Sheridan Associate Editor, Dark Reading, 1/18/2018
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by MariaColeman
Current Conversations That is pretty interesting) 
In reply to: Interesting
Post Your Own Reply
Posted by MariaColeman
Current Conversations Cool one) 
In reply to: Cool
Post Your Own Reply
More Conversations
PR Newswire
Intel Says to Stop Applying Problematic Spectre, Meltdown Patch
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/22/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Can Machine Learning Outsmart Malware?
Using machine learning in the cybersecurity domain is a growing trend with many advantages, but it also has its risks. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack. Read >>
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Dark Reading Live EVENTS
Dark Reading Security Pro Summit at Interop ITX 2018
Produced by the Dark Reading Team - The Security Pro Summit is an opportunity for IT security professionals to take a deeper dive into cyber security defense, learning from experts about advanced methods for detecting and responding to new threats.
Topics that will be discussed:
  • Improving Threat Analysis and Implement Threat Hunting Practices
  • Optimizing Vulnerability Detection & Remediation
  • Getting Better Performance From Your Security Operations Center
  • Plus, much more
Cartoon
White Papers
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Flash Poll
Video
Slideshows
Twitter Feed