Endpoint
News & Commentary
1.4 Million New Phishing Sites Launched Each Month
Dark Reading Staff, Quick Hits
The number of phishing attacks reach a record rate in 2017, but the majority of the phishing sites remain active for just four- to eight hours.
By Dark Reading Staff , 9/22/2017
Comment1 Comment  |  Read  |  Post a Comment
Americans Rank Criminal Hacking as Their Number One Threat
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Global warming and artificial intelligence rate as less of a threat to human health, safety, and prosperity, than getting hacked, according to a survey released today.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/22/2017
Comment0 comments  |  Read  |  Post a Comment
CCleaner Malware Targeted Tech Giants Cisco, Google, Microsoft
Kelly Sheridan, Associate Editor, Dark ReadingNews
The backdoor discovered in Avast's CCleaner targeted top tech companies including Google, Microsoft, Samsung, Sony, VMware, and Cisco.
By Kelly Sheridan Associate Editor, Dark Reading, 9/21/2017
Comment0 comments  |  Read  |  Post a Comment
SMBs Paid $301 Million to Ransomware Attackers
Dark Reading Staff, Quick Hits
But small- to midsized businesses are taking a tougher stand against ransomware attacks, according to a survey released today of the 2016-2017 period.
By Dark Reading Staff , 9/21/2017
Comment2 comments  |  Read  |  Post a Comment
OPM Data Breach Lawsuit Tossed, Fed Plaintiffs will Appeal
Dark Reading Staff, Quick Hits
A judge ruled federal employees cannot sue for damages from the 2015 Office of Personnel Management data breach.
By Dark Reading Staff , 9/21/2017
Comment17 comments  |  Read  |  Post a Comment
SecureAuth to Merge with Core Security
Dawn Kawamoto, Associate Editor, Dark ReadingNews
K1 Investment Management, which owns Core Security, plans to acquire the identity management and authentication company for more than $200 million.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/20/2017
Comment1 Comment  |  Read  |  Post a Comment
Get Serious about IoT Security
Derek Manky, Global Security Strategist, FortinetCommentary
These four best practices will help safeguard your organization in the Internet of Things.
By Derek Manky Global Security Strategist, Fortinet, 9/20/2017
Comment3 comments  |  Read  |  Post a Comment
10 Hot Cybersecurity Funding Rounds in Q3
Jai Vijayan, Freelance writer
The first two quarters of 2017 have been the most active ever in five years from a cybersecurity investment standpoint. Here's how the third quarter has shaped up.
By Jai Vijayan Freelance writer, 9/20/2017
Comment2 comments  |  Read  |  Post a Comment
Avast-Owned Piriform Releases CCleaner Security Update
Dark Reading Staff, Quick Hits
The Avast subsidiary has released two new versions of CCleaner following the discovery of a supply-chain attack.
By Dark Reading Staff , 9/19/2017
Comment1 Comment  |  Read  |  Post a Comment
New Spam Campaign Literally Doubles Down on Ransomware
Kelly Sheridan, Associate Editor, Dark ReadingNews
An upgraded spam campaign alternates Locky and FakeGlobe ransomware, forcing victims to pay twice or lose all their data.
By Kelly Sheridan Associate Editor, Dark Reading, 9/19/2017
Comment0 comments  |  Read  |  Post a Comment
GDPR & the Rise of the Automated Data Protection Officer
Terry Ray, Chief Technology Officer, ImpervaCommentary
Can artificial intelligence and machine learning solve the skills shortage as the EU's General Data Protection Regulation deadline approaches?
By Terry Ray Chief Technology Officer, Imperva, 9/19/2017
Comment1 Comment  |  Read  |  Post a Comment
How Apple's New Facial Recognition Technology Will Change Enterprise Security
Shimrit Tzur-David, CTO & Co-founder, Secret Double OctopusCommentary
Expect a trickle-down effect, as tech similar to Face ID becomes offered outside of Apple.
By Shimrit Tzur-David CTO & Co-founder, Secret Double Octopus, 9/19/2017
Comment0 comments  |  Read  |  Post a Comment
Avast CCleaner Compromised Amid Rise in Supply Chain Threats
Kelly Sheridan, Associate Editor, Dark ReadingNews
Attackers somehow hacked the build system of Avast's CCleaner to deliver malware, potentially affecting millions of users.
By Kelly Sheridan Associate Editor, Dark Reading, 9/18/2017
Comment0 comments  |  Read  |  Post a Comment
Equifax CIO, CSO Step Down
Dark Reading Staff, Quick Hits
Embattled credit-monitoring company names interim replacements for both positions and outlines more details about the massive breach.
By Dark Reading Staff , 9/15/2017
Comment5 comments  |  Read  |  Post a Comment
Attacks on Android Soared 40% in Q2
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Despite a rise in attacks, the average number of malicious variants remains surprisingly limited, according to a report from Avast.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/15/2017
Comment0 comments  |  Read  |  Post a Comment
Microsoft Office Zero-Day Spread Surveillance Software
Dark Reading Staff, Quick Hits
FireEye discovered CVE-2017-8759 flaw patched by Microsoft this week.
By Dark Reading Staff , 9/14/2017
Comment0 comments  |  Read  |  Post a Comment
'ExpensiveWall' Attacks More Than 1 Million Android Users
Dark Reading Staff, Quick Hits
New Android malware variant registers users for paid services without their permission and sends bogus premium SMS messages.
By Dark Reading Staff , 9/14/2017
Comment0 comments  |  Read  |  Post a Comment
'Bashware' Undermines Windows 10 Security Via Linux Subsystem
Jai Vijayan, Freelance writerNews
New WSL feature in Windows 10 gives attackers a way to run malware without being detected by any current endpoint security tools, Check Point says.
By Jai Vijayan Freelance writer, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
Experts Weigh Pros, Cons of FaceID Authentication in iPhone X
Kelly Sheridan, Associate Editor, Dark ReadingNews
Security pros discuss Apple's decision to swap fingerprint scanning for facial recognition technology in the latest iPhone.
By Kelly Sheridan Associate Editor, Dark Reading, 9/13/2017
Comment0 comments  |  Read  |  Post a Comment
5 Problems That Keep CISOs Awake at Night
Joshua Douglas, Chief Strategy Officer, RaytheonCommentary
The last few years have shown a big difference in the way cyber-risks are acknowledged, but progress still needs to be made.
By Joshua Douglas Chief Strategy Officer, Raytheon, 9/13/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
Get Serious about IoT Security
Derek Manky, Global Security Strategist, Fortinet,  9/20/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.