Perimeter
News & Commentary
Going Beyond Checkbox Security
Emily Johnson, Digital Content Editor, InformationWeekCommentaryVideo
Terry Barbounis, cybersecurity evangelist for CenturyLink, stops by the InformationWeek News Desk.
By Emily Johnson Digital Content Editor, InformationWeek, 5/24/2017
Comment0 comments  |  Read  |  Post a Comment
The Fundamental Flaw in TCP/IP: Connecting Everything
Jeff Hussey, President & CEO, Tempered NetworksCommentary
Almost 30 years after its inception, it's time to fix the engine that both fuels the modern day Internet and is the root cause of its most vexing security challenges.
By Jeff Hussey President & CEO, Tempered Networks, 5/17/2017
Comment4 comments  |  Read  |  Post a Comment
New 'Bondnet' Botnet Mines Cryptocurrencies
Kelly Sheridan, Associate Editor, Dark ReadingNews
The botnet has infected more than 15,000 machines at major institutions, including high-profile companies, universities, and city councils.
By Kelly Sheridan Associate Editor, Dark Reading, 5/4/2017
Comment0 comments  |  Read  |  Post a Comment
DDoS Attacks Surge, Organizations Struggle to Respond
Jai Vijayan, Freelance writerNews
Organizations often discover a DDoS attack only after being alerted to the fact by a third-party or customer, Neustar survey shows.
By Jai Vijayan Freelance writer, 5/2/2017
Comment0 comments  |  Read  |  Post a Comment
New Global Resilience Federation Will Share Threat Intel Across Industries
Dark Reading Staff, Quick Hits
Born out of a partnership of information sharing and analysis centers and organizations, Global Resilience Federation launches today to share intelligence and information across a number of industry sectors.
By Dark Reading Staff , 5/2/2017
Comment0 comments  |  Read  |  Post a Comment
CenturyLink, Medina Capital Deal Closes with Launch of Cyxtera Technologies
Dark Reading Staff, Quick Hits
CenturyLink's former data centers and colocation business were combined with Medina Capital's cybersecurity and analytics holdings to create new secure data center infrastructure firm.
By Dark Reading Staff , 5/2/2017
Comment0 comments  |  Read  |  Post a Comment
IT-OT Convergence: Coming to an Industrial Plant Near You
Barak Perelman, CEO, IndegyCommentary
There's been a big divide between IT and OT, but that must end. Here's how to make them come together.
By Barak Perelman CEO, Indegy, 4/25/2017
Comment0 comments  |  Read  |  Post a Comment
Intrusion Suppression:' Transforming Castles into Prisons
Tom Kellermann,  CEO & Cofounder, Strategic Cyber Ventures Commentary
How building cybersecurity structures that decrease adversaries dwell time can reduce the damage from a cyberattack.
By Tom Kellermann CEO & Cofounder, Strategic Cyber Ventures , 4/18/2017
Comment0 comments  |  Read  |  Post a Comment
Got an Industrial Network? Reduce your Risk of a Cyberattack with Defense in Depth
Jeff Lund, Senior Director, Belden Industrial IT GroupCommentary
If an aggressive, all-out cyberdefense strategy isnt already on your operational technology plan for 2017, its time to get busy.
By Jeff Lund Senior Director, Belden Industrial IT Group, 4/13/2017
Comment0 comments  |  Read  |  Post a Comment
New Breed of DDoS Attack On the Rise
Jai Vijayan, Freelance writerNews
Akamai Networks since October has detected and mitigated at least 50 DDoS attacks using Connectionless LDAP.
By Jai Vijayan Freelance writer, 4/13/2017
Comment0 comments  |  Read  |  Post a Comment
Cybercriminals Seized Control of Brazilian Bank for 5 Hours
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Sophisticated heist compromised major bank's entire DNS infrastructure.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/4/2017
Comment0 comments  |  Read  |  Post a Comment
To Gain Influence, CISOs Must Get Security's Human Element Right
Rocco Grillo, Cyber Resilience Leader at Stroz FriedbergCommentary
Focusing on certain elements of security in isolation can cause a false sense of security.
By Rocco Grillo Cyber Resilience Leader at Stroz Friedberg, 3/29/2017
Comment2 comments  |  Read  |  Post a Comment
Getting Beyond the Buzz & Hype of Threat Hunting
Kyle Wilhoit, Senior Security Researcher, DomainToolsCommentary
When harnessed properly, threat hunting can be one of the most useful techniques for finding attackers in your network. But it wont happen overnight.
By Kyle Wilhoit Senior Security Researcher, DomainTools, 3/20/2017
Comment0 comments  |  Read  |  Post a Comment
New Wave of Security Acquisitions Signals Start of Consolidation Trend
Steve Zurier, Freelance Writer
A dozen recent high-profile deals reflect cybersecurity vendors' hopes of expanding their offerings with next-generation technology, ideas, and talent.
By Steve Zurier Freelance Writer, 3/20/2017
Comment0 comments  |  Read  |  Post a Comment
Ethical Hacking: The Most Important Job No One Talks About
Amit Ashbel, Cybersecurity Evangelist at CheckmarxCommentary
If your company doesn't have an ethical hacker on the security team, it's playing a one-sided game of defense against attackers.
By Amit Ashbel Cybersecurity Evangelist at Checkmarx, 3/16/2017
Comment4 comments  |  Read  |  Post a Comment
Trust Begins With Layer 1 Encryption
Hector Menendez, Product Marketing Manager, IP/Optical Networks, NokiaCommentary
In todays distributed environment, cloud and communication service providers can play a key role in providing organizations with a scalable and secure platform for the connection of everything to everything. Heres how.
By Hector Menendez Product Marketing Manager, IP/Optical Networks, Nokia, 3/15/2017
Comment0 comments  |  Read  |  Post a Comment
What Your SecOps Team Can (and Should) Do
Chris Crowley, Independent Consultant at Montance, LLCCommentary
If your organization has all of these pieces in place, congratulations!
By Chris Crowley Independent Consultant at Montance, LLC, 3/13/2017
Comment0 comments  |  Read  |  Post a Comment
Mobile (In)security: Dark Reading Cartoon Caption Contest Winners
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Clever word play on mobile ransomware, cloud and the Internet of Things. And the winners are
By Marilyn Cohodas Community Editor, Dark Reading, 3/9/2017
Comment4 comments  |  Read  |  Post a Comment
Securing Todays 'Elastic Attack Surface'
Amit Yoran, Chairman & CEO, Tenable Network SecurityCommentary
The foundation of good cybersecurity is knowing your network. But as organizations embrace new technologies, that simple task has gotten incredibly difficult.
By Amit Yoran Chairman & CEO, Tenable Network Security, 3/9/2017
Comment1 Comment  |  Read  |  Post a Comment
9 Phishing Lures that Could Hijack your 2017 Tax Refund
Steve Zurier, Freelance Writer
Scammers are taking an aggressive approach to tax season this year, packing attachments and links with banking Trojans, and fairly new strains of ransomware.
By Steve Zurier Freelance Writer, 3/9/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by [email protected]
Current Conversations Her: I wonder how much our ISP will sell the Story of Us for? Him: I hope we get a discount.
In reply to: Cartoon Caption
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.