News & Commentary
Report: OilRig' Attacks Expanding Across Industries, Geographies
James Carder, CISO & VP, LogRhythm Labs, LogRhythm, Inc.Commentary
Malware targets Middle Eastern airlines, government, financial industries and critical infrastructure with a simple but powerful backdoor created by infected Excel files attached to phishing emails.
By James Carder CISO & VP, LogRhythm Labs, LogRhythm, Inc., 3/21/2017
Comment0 comments  |  Read  |  Post a Comment
Getting Beyond the Buzz & Hype of Threat Hunting
Kyle Wilhoit, Senior Security Researcher, DomainToolsCommentary
When harnessed properly, threat hunting can be one of the most useful techniques for finding attackers in your network. But it wont happen overnight.
By Kyle Wilhoit Senior Security Researcher, DomainTools, 3/20/2017
Comment0 comments  |  Read  |  Post a Comment
New Wave of Security Acquisitions Signals Start of Consolidation Trend
Steve Zurier, Freelance Writer
A dozen recent high-profile deals reflect cybersecurity vendors' hopes of expanding their offerings with next-generation technology, ideas, and talent.
By Steve Zurier Freelance Writer, 3/20/2017
Comment0 comments  |  Read  |  Post a Comment
Embrace the Machine & Other Goals for CISOs
Mike Convertino, CISO & VP, Information Security, F5 NetworksCommentary
Here are five ways we can become more effective for our organizations.
By Mike Convertino CISO & VP, Information Security, F5 Networks, 3/17/2017
Comment0 comments  |  Read  |  Post a Comment
US-CERT Warns That HTTPS Inspection Tools Weaken TLS
Sara Peters, Senior Editor at Dark ReadingQuick Hits
Turns out that man-in-the-middling your own traffic isn't the safest way to look for man-in-the-middle attacks.
By Sara Peters Senior Editor at Dark Reading, 3/16/2017
Comment2 comments  |  Read  |  Post a Comment
In Cyber, Who Do We Trust to Protect the Business?
Peter Gleason, President & CEO, National Association of Corporate Directors (NACD)Commentary
If business leaders and directors continue to view cybersecurity as mainly a matter for the IT department, they will leave their companies exposed to significant risks.
By Peter Gleason President & CEO, National Association of Corporate Directors (NACD), 3/16/2017
Comment0 comments  |  Read  |  Post a Comment
Women Still Only 11% Of Global InfoSec Workforce
Sara Peters, Senior Editor at Dark ReadingNews
Career development and mentorship programs make women in cybersecurity feel more valued, increase women's success.
By Sara Peters Senior Editor at Dark Reading, 3/15/2017
Comment4 comments  |  Read  |  Post a Comment
Security in the Age of Open Source
Mike Pittenger, Vice President, Security Strategy at Black Duck SoftwareCommentary
Dramatic changes in the use of open source software over the past decade demands major changes in security testing regimens today. Here's what you need to know and do about it.
By Mike Pittenger Vice President, Security Strategy at Black Duck Software, 3/15/2017
Comment0 comments  |  Read  |  Post a Comment
Awareness Training Can Help Quell Ransomware Attacks
Dark Reading Staff, Quick Hits
53 percent of organizations fall victim to ransomware, despite multiple technological defenses; but the right awareness training brings that infection rate down significantly, KnowBe4 study finds.
By Dark Reading Staff , 3/14/2017
Comment1 Comment  |  Read  |  Post a Comment
What Your SecOps Team Can (and Should) Do
Chris Crowley, Independent Consultant at Montance, LLCCommentary
If your organization has all of these pieces in place, congratulations!
By Chris Crowley Independent Consultant at Montance, LLC, 3/13/2017
Comment0 comments  |  Read  |  Post a Comment
This Week On Dark Reading: Events Calendar
Dark Reading Staff, Commentary
How to become a threat hunter, how to build a cybersecurity architecture that actually defends against today's risks, and much more...
By Dark Reading Staff , 3/13/2017
Comment1 Comment  |  Read  |  Post a Comment
Securing Todays 'Elastic Attack Surface'
Amit Yoran, Chairman & CEO, Tenable Network SecurityCommentary
The foundation of good cybersecurity is knowing your network. But as organizations embrace new technologies, that simple task has gotten incredibly difficult.
By Amit Yoran Chairman & CEO, Tenable Network Security, 3/9/2017
Comment1 Comment  |  Read  |  Post a Comment
Fortune 1000 Companies See Security Ratings Drop
Kelly Sheridan, Associate Editor, InformationWeekNews
Fortune 1000 businesses report more breaches, and lower security performance, than their non-F1000 counterparts.
By Kelly Sheridan Associate Editor, InformationWeek, 3/8/2017
Comment0 comments  |  Read  |  Post a Comment
Trust, Cloud & the Quest for a Glass Wall around Security
Stan Black, CSO, CitrixCommentary
In the next year, were going to see a leap towards strategic, business-level objectives that can be resolved by simplifying infrastructure and granting greater visibility in real time.
By Stan Black CSO, Citrix, 3/8/2017
Comment0 comments  |  Read  |  Post a Comment
A Real-Life Look into Responsible Disclosure for Security Vulnerabilities
Marc Laliberte, Information Security Threat Analyst, WatchGuard TechnologiesCommentary
A researcher gives us a glimpse into what happened when he found a problem with an IoT device.
By Marc Laliberte Information Security Threat Analyst, WatchGuard Technologies, 3/7/2017
Comment2 comments  |  Read  |  Post a Comment
New Yorks Cyber Regulations: How to Take Action & Whos Next
Prakash Linga, CTO & Co-founder of VeraCommentary
Even if your company isnt directly subject to these new rules, you can assume that the approach will be adopted by regulatory agencies at home and abroad eventually.
By Prakash Linga , 3/6/2017
Comment0 comments  |  Read  |  Post a Comment
US Lawmakers Seek Grant For State, Local Cybersecurity
Dark Reading Staff, Quick Hits
State Cyber Resiliency Act aims to increase resources for governments so they can fight cyber threats.
By Dark Reading Staff , 3/6/2017
Comment0 comments  |  Read  |  Post a Comment
Yahoo CEO Punished for Data Breaches
Dark Reading Staff, Quick Hits
Marissa Mayer will be denied her annual bonus of around $2 million and also forgoes annual stock award worth millions.
By Dark Reading Staff , 3/3/2017
Comment2 comments  |  Read  |  Post a Comment
Today on Dark Reading: Your Costs, Risks & Metrics Questions Answered
Dark Reading Staff, Commentary
First up on the Dark Reading upcoming events calendar is our Dark Reading Virtual Event Tuesday, Feb. 28.
By Dark Reading Staff , 2/27/2017
Comment4 comments  |  Read  |  Post a Comment
20 Questions for SecOps Platform Providers
Joshua Goldfarb, VP & CTO - Emerging Technologies, FireEyeCommentary
Security operations capabilities for the masses is long overdue. Heres how to find a solution that meets your budget and resources.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 2/27/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Plumber
Current Conversations I need one myself!!!
In reply to: Plumber Hair Cuts">Re: Plumber Hair Cuts
Post Your Own Reply
Posted by technicalaccademy
Current Conversations nice post
In reply to: microsofttechnology">microsofttechnology
Post Your Own Reply
Posted by Shantaram
Current Conversations nice tips, thanks
In reply to:">Re:
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.