Perimeter

News & Commentary
NC Water Utility Fights Post-Hurricane Ransomware
Kelly Sheridan, Staff Editor, Dark ReadingNews
North Carolina's Onslow Water and Sewer Authority was hit with an advanced attack in the wake of Hurricane Florence.
By Kelly Sheridan Staff Editor, Dark Reading, 10/16/2018
Comment1 Comment  |  Read  |  Post a Comment
Rapid7 Acquires tCell
Dark Reading Staff, Quick Hits
The purchase brings together a cloud security platform with a web application firewall.
By Dark Reading Staff , 10/16/2018
Comment0 comments  |  Read  |  Post a Comment
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Speaking at the Gartner Symposium/ITxpo, analyst Peter Firstbrook's list of trends is likely to inform executive committee conversations for the next 12 months.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 10/15/2018
Comment2 comments  |  Read  |  Post a Comment
IBM Builds 'SOC on Wheels' to Drive Cybersecurity Training
Kelly Sheridan, Staff Editor, Dark ReadingNews
A tractor trailer housing a Cyber Tactical Operation Center will travel throughout the US and Europe for incident response training, security support, and education.
By Kelly Sheridan Staff Editor, Dark Reading, 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
Threat Hunters & Security Analysts: A Dynamic Duo
Rick Costanzo, CEO, RANK SoftwareCommentary
Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.
By Rick Costanzo CEO, RANK Software, 10/12/2018
Comment1 Comment  |  Read  |  Post a Comment
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
By Steve Zurier Freelance Writer, 10/12/2018
Comment3 comments  |  Read  |  Post a Comment
Window Snyder Shares Her Plans for Intel Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.
By Kelly Sheridan Staff Editor, Dark Reading, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Google Adds New Identity, Security Tools to Cloud Platform
Kelly Sheridan, Staff Editor, Dark ReadingNews
A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.
By Kelly Sheridan Staff Editor, Dark Reading, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
One-Third of US Adults Hit with Identity Theft
Dark Reading Staff, Quick Hits
That's double the global average and more than three times the rate of French and German adults.
By Dark Reading Staff , 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
The Better Way: Threat Analysis & IIoT Security
Satish Gannu, Chief Security Officer, ABBCommentary
Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.
By Satish Gannu Chief Security Officer, ABB, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Meet 5 Women Shaping Microsoft's Security Strategy
Kelly Sheridan, Staff Editor, Dark Reading
Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity.
By Kelly Sheridan Staff Editor, Dark Reading, 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
Russian Hacking Groups Intersect in Recent Cyberattacks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
Imperva to Be Acquired by Thoma Bravo for $2.1 Billion
Dark Reading Staff, Quick Hits
But two law firms are investigating whether the security vendor breached its fiduciary duty to shareholders by not actively seeking buyers offering a higher price.
By Dark Reading Staff , 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
IIS Attacks Skyrocket, Hit 1.7M in Q2
Dark Reading Staff, Quick Hits
Drupal and Oracle WebLogic also were hit with more cyberattacks during same quarter.
By Dark Reading Staff , 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
Security Researchers Struggle with Bot Management Programs
Kaan Onarlioglu, Senior Security Researcher, AkamaiCommentary
Bots are a known problem, but researchers will tell you that bot defenses create problems of their own when it comes to valuable data.
By Kaan Onarlioglu Senior Security Researcher, Akamai, 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
Constructing the Future of ICS Cybersecurity
Kelly Sheridan, Staff Editor, Dark ReadingNews
As industrial control systems are connected to the cloud and the IoT, experts discuss security challenges.
By Kelly Sheridan Staff Editor, Dark Reading, 10/9/2018
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Fixes Privilege Escalation 0Day Under Active Attack
Kelly Sheridan, Staff Editor, Dark ReadingNews
This month's Patch Tuesday includes 49 patches, two of which are ranked Critical, and two security advisories.
By Kelly Sheridan Staff Editor, Dark Reading, 10/9/2018
Comment0 comments  |  Read  |  Post a Comment
DoD Weapon Systems Contain Security Vulnerabilities
Dark Reading Staff, Quick Hits
GAO report outlines challenges for the US Department of Defense to handle security flaws in weapon systems.
By Dark Reading Staff , 10/9/2018
Comment0 comments  |  Read  |  Post a Comment
Mandia: Tipping Point Now Here for Rules of Cyber Engagement
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
FireEye CEO and nation-state hacking expert Kevin Mandia says Russia began changing the game in 2015.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/5/2018
Comment0 comments  |  Read  |  Post a Comment
Most Home Routers Are Full of Vulnerabilities
Dark Reading Staff, Quick Hits
More than 80% of surveyed routers had, on average, 172 security vulnerabilities, new research shows.
By Dark Reading Staff , 10/5/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by ronaldthomas
Current Conversations good post
In reply to: a
Post Your Own Reply
More Conversations
PR Newswire
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.