Risk

News & Commentary
Less Than Half of Cyberattacks Detected via Antivirus: SANS
Kelly Sheridan, Staff Editor, Dark ReadingNews
Companies are buying next-gen antivirus and fileless attack detection tools but few have the resources to use them, researchers report.
By Kelly Sheridan Staff Editor, Dark Reading, 7/16/2018
Comment0 comments  |  Read  |  Post a Comment
Time to Yank Cybercrime into the Light
Marc Wilczek, Digital Strategist & CIO AdvisorCommentary
Too many organizations are still operating blindfolded, research finds.
By Marc Wilczek Digital Strategist & CIO Advisor, 7/16/2018
Comment0 comments  |  Read  |  Post a Comment
Congressional Report Cites States Most Vulnerable to Election Hacking
Dark Reading Staff, Quick Hits
A new report details issues with 18 states along with suggestions on what can be done.
By Dark Reading Staff , 7/13/2018
Comment0 comments  |  Read  |  Post a Comment
Newly Found Spectre Variants Bring New Concerns
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Two new variants on a theme of Spectre underscore the expanding nature of the critical vulnerabilities.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/11/2018
Comment0 comments  |  Read  |  Post a Comment
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR InstituteCommentary
Measuring security risk is not that hard if you get your terms straight and leverage well-established methods and principles from other disciplines.
By Jack Jones Chairman, FAIR Institute, 7/11/2018
Comment3 comments  |  Read  |  Post a Comment
Microsoft July Security Updates Mostly Browser-Related
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Patch Tuesday includes 53 security updates, including mitigation for the latest side-channel attack.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/10/2018
Comment0 comments  |  Read  |  Post a Comment
Businesses Struggle to Build 'Security-First' Culture
Kelly Sheridan, Staff Editor, Dark ReadingNews
New Accenture study finds half of businesses provide cybersecurity training for new hires and only 40% of CISOs prioritize building or expanding insider threat programs.
By Kelly Sheridan Staff Editor, Dark Reading, 7/10/2018
Comment1 Comment  |  Read  |  Post a Comment
Putin Pushes for Global Cybersecurity Cooperation
Dark Reading Staff, Quick Hits
At a Moscow-based security conference, Russian President Vladimir Putin said countries should work together amid the rise of cyberthreats.
By Dark Reading Staff , 7/6/2018
Comment2 comments  |  Read  |  Post a Comment
New Malware Variant Hits With Ransomware or Cryptomining
Dark Reading Staff, Quick Hits
A new variant of old malware scans a system before deciding just how to administer pain.
By Dark Reading Staff , 7/5/2018
Comment0 comments  |  Read  |  Post a Comment
UK Banks Must Produce Backup Plans for Cyberattacks
Dark Reading Staff, Quick Hits
Financial services firms in Britain have three months to explain how they would stay up and running in the event of an attack or service disruption.
By Dark Reading Staff , 7/5/2018
Comment3 comments  |  Read  |  Post a Comment
Ransomware vs. Cryptojacking
Jay Kelley, Senior Product & Digital Marketing Manager, Menlo Security, Inc. Commentary
Cybercriminals are increasingly turning to cryptojacking over ransomware for a bigger payday. Here's what enterprises need to know in order to protect their digital assets and bank accounts.
By Jay Kelley Senior Product & Digital Marketing Manager, Menlo Security, Inc. , 7/3/2018
Comment0 comments  |  Read  |  Post a Comment
6 Drivers of Mental and Emotional Stress in Infosec
Kelly Sheridan, Staff Editor, Dark Reading
Pressure comes in many forms but often with the same end result: stress and burnout within the security community.
By Kelly Sheridan Staff Editor, Dark Reading, 7/2/2018
Comment3 comments  |  Read  |  Post a Comment
There's No Automating Your Way Out of Security Hiring Woes
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Call it the paradox of cybersecurity automation: It makes your staff more productive but takes more quality experts to make it work.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/28/2018
Comment0 comments  |  Read  |  Post a Comment
65% of Resold Memory Cards Still Pack Personal Data
Kelly Sheridan, Staff Editor, Dark ReadingNews
Analyzed cards, mainly from smartphones and tablets, contained private personal information, business documentation, audio, video, and photos.
By Kelly Sheridan Staff Editor, Dark Reading, 6/28/2018
Comment1 Comment  |  Read  |  Post a Comment
Ticketmaster UK Warns Thousands of Data Breach
Dark Reading Staff, Quick Hits
Customers who bought tickets through the site are advised to check for fraudulent transactions with Uber, Netflix, and Xendpay.
By Dark Reading Staff , 6/28/2018
Comment8 comments  |  Read  |  Post a Comment
Redefining Security with Blockchain
Stan Black, CSIO, CitrixCommentary
Blockchain offers a proactive approach to secure a new generation of digital platforms and services for both enterprises and individuals.
By Stan Black CSIO, Citrix, 6/28/2018
Comment1 Comment  |  Read  |  Post a Comment
Today! 'Why Cybercriminals Attack,' A Dark Reading Virtual Event
Dark Reading Staff, Commentary
Wednesday, June 27, this all-day event starting at 11 a.m. ET, will help you decide who and what you really need to defend against, and how to do it more effectively.
By Dark Reading Staff , 6/27/2018
Comment3 comments  |  Read  |  Post a Comment
Insider Dangers Are Hiding in Collaboration Tools
Ericka Chickowski, Contributing Writer, Dark ReadingNews
The casual sharing of sensitive data, such as passwords, is opening the door to malicious insiders.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/26/2018
Comment14 comments  |  Read  |  Post a Comment
US Announces Arrests in Ghanian Fraud Schemes
Dark Reading Staff, Quick Hits
Eight individuals in the US and Ghana are charged with stealing more than $15 million through computer-based fraud.
By Dark Reading Staff , 6/26/2018
Comment1 Comment  |  Read  |  Post a Comment
Secure by Default Is Not What You Think
Tom Thomassen, Senior Staff Engineer of Security, MarkLogicCommentary
The traditional view of secure by default which has largely been secure out of the box is too narrow. To broaden your view, consider these three parameters.
By Tom Thomassen Senior Staff Engineer of Security, MarkLogic, 6/26/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
7 Ways to Keep DNS Safe
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Locked device, Ha! I knew there was another way in.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14337
PUBLISHED: 2018-07-17
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
CVE-2018-14329
PUBLISHED: 2018-07-17
In HTSlib 1.8, a race condition in cram/cram_io.c might allow local users to overwrite arbitrary files via a symlink attack.
CVE-2018-14331
PUBLISHED: 2018-07-17
An issue was discovered in XiaoCms X1 v20140305. There is a CSRF vulnerability to change the administrator account password via admin/index.php?c=index&a=my.
CVE-2018-14333
PUBLISHED: 2018-07-17
TeamViewer through 13.1.1548 stores a password in Unicode format within TeamViewer.exe process memory between "[00 88] and "[00 00 00]" delimiters, which might make it easier for attackers to obtain sensitive information by leveraging an unattended workstation on which TeamViewer has ...
CVE-2018-14334
PUBLISHED: 2018-07-17
manager/editor/upload.php in joyplus-cms 1.6.0 allows arbitrary file upload because detection of a prohibited file extension simply sets the $errm value, and does not otherwise alter the flow of control. Consequently, one can upload and execute a .php file, a similar issue to CVE-2018-8766.