Breach Defense Playbook: Cybersecurity Governance
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
Time to leave the island: Integrate cybersecurity into your risk management strategy.
By Ryan Vela Regional Director, Fidelis Cybersecurity, 6/25/2015
Comment1 Comment  |  Read  |  Post a Comment
Breach Defense Playbook: Incident Response Readiness (Part 2)
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
Will your incident response plan work when a real-world situation occurs?
By Ryan Vela Regional Director, Fidelis Cybersecurity, 6/24/2015
Comment0 comments  |  Read  |  Post a Comment
Breach Defense Playbook: Incident Response Readiness (Part 1)
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
Will your incident response plan work when a real-world situation occurs?
By Ryan Vela Regional Director, Fidelis Cybersecurity, 6/23/2015
Comment0 comments  |  Read  |  Post a Comment
Breach Defense Playbook: Open Source Intelligence
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
Do you know what information out there is putting you at risk?
By Ryan Vela Regional Director, Fidelis Cybersecurity, 6/22/2015
Comment0 comments  |  Read  |  Post a Comment
Breach Defense Playbook: Reviewing Your Cybersecurity Program (Part 2)
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
Cybersecurity requires a combination of people, process, and technology in a coordinated implementation leveraging a defense-in-depth methodology.
By Ryan Vela Regional Director, Fidelis Cybersecurity, 6/18/2015
Comment0 comments  |  Read  |  Post a Comment
Breach Defense Playbook: Reviewing Your Cybersecurity Program (Part 1)
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
How does your cybersecurity program compare to your industry peers?
By Ryan Vela Regional Director, Fidelis Cybersecurity, 6/17/2015
Comment0 comments  |  Read  |  Post a Comment
Breach Defense Playbook: Hunting For Breach Indicators
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
Do you proactively hunt for malware on your network, or do you wait for your tools to tell you?
By Ryan Vela Regional Director, Fidelis Cybersecurity, 6/11/2015
Comment0 comments  |  Read  |  Post a Comment
Breach Defense Playbook: Assessing Your Security Controls
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
Do you include physical security as part of your cybersecurity risk management plan?
By Ryan Vela Regional Director, Fidelis Cybersecurity, 6/10/2015
Comment0 comments  |  Read  |  Post a Comment
Breach Defense Playbook: Assessing Your Cybersecurity Engineering
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
Is your cybersecurity infrastructure robust enough to defend against future attacks?
By Ryan Vela Regional Director, Fidelis Cybersecurity, 6/9/2015
Comment0 comments  |  Read  |  Post a Comment
Drinking from the Malware Fire Hose
John Bambenek , Senior Threat Researcher, Fidelis CybersecurityCommentary
Take a staged approach to processing malware in bulk so that scarce and time-limited resources can be prioritized for only those threats that truly require them.
By John Bambenek Senior Threat Researcher, Fidelis Cybersecurity, 5/15/2015
Comment0 comments  |  Read  |  Post a Comment
Third-Party Risk and Organizational Situational Awareness
Emilio Iasiello, Senior Cyber Intelligence Analyst, Fidelis CybersecurityCommentary
A rigorous risk management approach will help organizations understand the potential risks posed by their partners.
By Emilio Iasiello Senior Cyber Intelligence Analyst, Fidelis Cybersecurity, 4/27/2015
Comment0 comments  |  Read  |  Post a Comment
The Rise of Counterintelligence in Malware Investigations
John Bambenek , Senior Threat Researcher, Fidelis CybersecurityCommentary
The key to operationalizing cybersecurity threat intelligence rests in the critical thinking that establishes that a given indicator is, in fact, malicious.
By John Bambenek Senior Threat Researcher, Fidelis Cybersecurity, 4/22/2015
Comment1 Comment  |  Read  |  Post a Comment
Breach Defense Playbook
Ryan Vela  , Regional Director, Fidelis CybersecurityCommentary
How to be smart about defending against your next attack.
By Ryan Vela Regional Director, Fidelis Cybersecurity, 4/16/2015
Comment0 comments  |  Read  |  Post a Comment
Threat Intelligence Is a Two-Way Street
Emilio Iasiello, Senior Cyber Intelligence Analyst, Fidelis CybersecurityCommentary
Intelligence analysis should be looked upon as less of a service and more of a partnership.
By Emilio Iasiello Senior Cyber Intelligence Analyst, Fidelis Cybersecurity, 4/14/2015
Comment0 comments  |  Read  |  Post a Comment
Principles of Malware Sinkholing
John Bambenek , Senior Threat Researcher, Fidelis CybersecurityCommentary
The process of sinkholing is an important tool to have in your arsenal when dealing with emerging threats.
By John Bambenek Senior Threat Researcher, Fidelis Cybersecurity, 4/6/2015
Comment0 comments  |  Read  |  Post a Comment
Application of Threat Indicators: A Temporal View
Hardik Modi , Director of Threat Research, Fidelis CybersecurityCommentary
Better outcomes will be achieved when were applying temporal considerations to threat indicators.
By Hardik Modi Director of Threat Research, Fidelis Cybersecurity, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
Companies Blindly Believe They've Locked Down Users' Mobile Use
Dawn Kawamoto, Associate Editor, Dark Reading,  11/14/2017
Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Kelly Sheridan, Associate Editor, Dark Reading,  11/14/2017
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Fidelis Cybersecurity provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services – delivered by an elite team of security professionals with decades of hands-on experience – and our award-winning Fidelis XPS™ Advanced Threat Defense Products, which provide visibility and control over the entire threat life cycle.
Featured Writers
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.