Risk
News & Commentary
'Smart' Building Industry Mulls Cybersecurity Challenges
Sara Peters, Senior Editor at Dark ReadingNews
New 'attraction and curiosity' for infosec at the Intelligent Buildings Conference this week.
By Sara Peters Senior Editor at Dark Reading, 6/23/2016
Comment1 Comment  |  Read  |  Post a Comment
Crypto Ransomware Officially Eclipses Screen-Blocker Ransomware
Jai Vijayan, Freelance writerNews
Encryption malware represented 54 percent of all ransomware in April compared to barely 10 percent a year ago, Kaspersky Lab found.
By Jai Vijayan Freelance writer, 6/22/2016
Comment1 Comment  |  Read  |  Post a Comment
‘Bug Poachers:’ A New Breed of Cybercriminal
Chris Wysopal, CTO, CISO and co-founder, VeracodeCommentary
As if security researchers don’t have enough to worry about, we now have to contend with extortionists who take advantage of the well-established fact that applications are a ripe target for exploitation.
By Chris Wysopal CTO, CISO and co-founder, Veracode, 6/22/2016
Comment0 comments  |  Read  |  Post a Comment
How Secure is Secure? Tips For Investing In The Right Strategy
Pritesh Parekh, VP & Chief Security Officer, ZuoraCommentary
Business alignment, defense-in-depth and a phased approach are three principles to follow when building out a solid security program.
By Pritesh Parekh VP & Chief Security Officer, Zuora, 6/17/2016
Comment1 Comment  |  Read  |  Post a Comment
NATO Officially Declares Cyberspace A Domain For War
Dark Reading Staff, Quick Hits
Cyberattack on a NATO ally will now trigger a collective response.
By Dark Reading Staff , 6/17/2016
Comment1 Comment  |  Read  |  Post a Comment
What CISOs Need to Tell The Board About Cyber Risk
Chris Veltsos,  Associate Professor, Minnesota State University, MankatoCommentary
To avoid devastating financial losses, boards and the C-suite must have a deep understating of the cyber risks their organizations’ face. Here’s what they need to hear from the security team
By Chris Veltsos Associate Professor, Minnesota State University, Mankato, 6/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Average Cost Of Data Breaches Rises Past $4 Million, Ponemon Says
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Ponemon annual report shows benchmark index on the rise again, while Deloitte advises those tangible costs may be just the start to financial impact racked up by breached organizations.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Preliminary Agreement Reached On Airline Cybersecurity
Dark Reading Staff, Quick Hits
Panel likely to propose broad package of cyber protection including cockpit alarms, say sources.
By Dark Reading Staff , 6/14/2016
Comment0 comments  |  Read  |  Post a Comment
3 Tips for Improving Communications with Top Management
Steve Zurier, Freelance WriterNews
Here are some steps security managers can take to deliver the information the executive suite needs to make better decisions on cyber security.
By Steve Zurier Freelance Writer, 6/14/2016
Comment0 comments  |  Read  |  Post a Comment
12 Tips for Securing Cyber Insurance Coverage
Sean Martin, CISSP | President, imsmartin
As cyber insurance grows more available and popular it is also becoming increasingly complex and confusing. Our slideshow offers guidelines on how to get insurance, get decent coverage, and avoid limitations in coverage.
By Sean Martin CISSP | President, imsmartin, 6/13/2016
Comment0 comments  |  Read  |  Post a Comment
27% Of Corporate-Connected Apps Are Risky
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Number of apps up by 30x, with many asking for sensitive connections to enterprise.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/13/2016
Comment0 comments  |  Read  |  Post a Comment
Singapore To Cut Internet Access For Government Computers
Dark Reading Staff, Quick Hits
To counter cyberattacks, 100,000 computers will be taken offline next May.
By Dark Reading Staff , 6/10/2016
Comment0 comments  |  Read  |  Post a Comment
Cloud Apps Just As Secure As On-Premise Apps, Say InfoSec Pros
Sara Peters, Senior Editor at Dark ReadingNews
Unfortunately, 75% of cloud apps will still fall afoul of the new EU General Data Protection Regulation, according to new studies.
By Sara Peters Senior Editor at Dark Reading, 6/9/2016
Comment0 comments  |  Read  |  Post a Comment
Google Dorking: Exposing The Hidden Threat
Srinivas Mukkamala, Co-founder & CEO, RiskSenseCommentary
Google Dorking sounds harmless, but it can take your company down. Here's what you need to know to avoid being hacked.
By Srinivas Mukkamala Co-founder & CEO, RiskSense, 6/9/2016
Comment1 Comment  |  Read  |  Post a Comment
Enterprises Still Don't Base Vuln Remediation On Risk
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New White Hat study shows critical vulnerabilities aren't fixed any faster than other security flaws.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/7/2016
Comment1 Comment  |  Read  |  Post a Comment
How To Prepare For A Data Breach
Sean Martin, CISSP | President, imsmartin
These five from-the-trenches strategies will help you win the fight against today's sophisticated, conniving attackers.
By Sean Martin CISSP | President, imsmartin, 6/7/2016
Comment0 comments  |  Read  |  Post a Comment
Top Security To-Dos For The Entertainment Industry
Sara Peters, Senior Editor at Dark ReadingNews
'The biz' has unique security needs. And it isn't only about preventing 'the next Sony.'
By Sara Peters Senior Editor at Dark Reading, 6/6/2016
Comment1 Comment  |  Read  |  Post a Comment
How Risky Is Bleeding Edge Tech?
Ericka Chickowski, Contributing Writer, Dark Reading
Experts with the Carnegie Mellon University Software Engineering Institute rate 10 up-and-coming technologies for risk.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/5/2016
Comment1 Comment  |  Read  |  Post a Comment
Ransomware Scam Profits Not As 'Glamorous' As You'd Think
Jai Vijayan, Freelance writerNews
Bosses typically make about $90K a year, affiliates much less, Flashpoint study finds.
By Jai Vijayan Freelance writer, 6/2/2016
Comment0 comments  |  Read  |  Post a Comment
How Facebook Raises A Generation Of Intelligence Analysts
Gadi Evron, CEO & Founder, Cymmetria, head of Israeli CERT, Chairman, Cyber Threat Intelligence AllianceCommentary
In the process of creating and administering groups, users learn how to read data points, create a risk profile in their head, and watch for changes over time.
By Gadi Evron CEO & Founder, Cymmetria, head of Israeli CERT, Chairman, Cyber Threat Intelligence Alliance, 6/2/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by shankarmak
Current Conversations nice post dis
In reply to: Re: Pending Review
Post Your Own Reply
Posted by Sadanandwak
Current Conversations GOOD ONE DIS
In reply to: Re: Pending Review
Post Your Own Reply
Posted by Tracyaustinmak
Current Conversations gerat one
In reply to: Re: Pending Review
Post Your Own Reply
Posted by RobbyF912
Current Conversations Nice tips!
In reply to: goo article
Post Your Own Reply
Posted by Cillyaussemak
Current Conversations great one post
In reply to: Re: Merger with Bit9
Post Your Own Reply
Posted by Juliealbeartmak
Current Conversations nice post good
In reply to: Re: Merger with Bit9
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How To Build An Effective Defense Against Ransomware
A compendium of Dark Reading´s best recent coverage of ransomware attacks, as well as best practices for defending your enterprise against them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers