Analytics // Threat Intelligence
News & Commentary
Free Scanning Tool Promises To Find Heartbleed On Any Device
Tim Wilson, Editor in Chief, Dark ReadingQuick Hits
CrowdStrike says tool identifies the flaw on web servers, VPNs, servers, routers, printers, and phones.
By Tim Wilson Editor in Chief, Dark Reading, 4/22/2014
Comment3 comments  |  Read  |  Post a Comment
Stolen Passwords Used In Most Data Breaches
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
New Verizon 2014 Data Breach Investigations Report identifies nine types of attack patterns that accounted for 93 percent of security incidents in the past decade.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 4/22/2014
Comment7 comments  |  Read  |  Post a Comment
11 Heartbleed Facts: Vulnerability Discovery, Mitigation Continue
Mathew J. Schwartz, News
Millions of websites, applications from Cisco and VMware, Google Play apps, as well as millions of Android devices are vulnerable -- and the list keeps growing.
By Mathew J. Schwartz , 4/17/2014
Comment2 comments  |  Read  |  Post a Comment
Don't Blame It On The Web Programming Platform
Kelly Jackson Higgins, Senior Editor, Dark ReadingQuick Hits
New data shows no one Web development platform generates more vulnerabilities than another -- and website security is still a problem.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 4/15/2014
Comment3 comments  |  Read  |  Post a Comment
White House Details Zero-Day Bug Policy
Mathew J. Schwartz, News
NSA denies prior knowledge of the Heartbleed vulnerability, but the White House reserves the right to withhold zero-day exploit information in some cases involving security or law enforcement.
By Mathew J. Schwartz , 4/15/2014
Comment3 comments  |  Read  |  Post a Comment
Heartbleed's Intranet & VPN Connection
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
How the game-changing crypto bug affects internal servers, clients, and VPN networks -- and what to do about it.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 4/14/2014
Comment4 comments  |  Read  |  Post a Comment
One Year Later: The APT1 Report
Nick Selby, CEO, StreetCred Software, IncCommentary
One of the most positive impacts of APT1 is the undeniable rise in the stature of the threat intelligence industry. "Threat Intelligence" is the SIEM, the NAC of 2014.
By Nick Selby CEO, StreetCred Software, Inc, 4/8/2014
Comment2 comments  |  Read  |  Post a Comment
Advanced Attacks Are The New Norm, Study Says
Tim Wilson, Editor in Chief, Dark ReadingQuick Hits
According to the Websense 2014 Threat Report, most malicious exploits now are advanced and targeted.
By Tim Wilson Editor in Chief, Dark Reading, 4/4/2014
Comment5 comments  |  Read  |  Post a Comment
Facebook Builds Its Own Threat Modeling System
Kelly Jackson Higgins, Senior Editor, Dark ReadingQuick Hits
The tool helps the social network gather, store, analyze, and react to the latest threats against it.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 3/26/2014
Comment4 comments  |  Read  |  Post a Comment
Startup Confer Launches Cyberthreat Prevention Network
Tim Wilson, Editor in Chief, Dark ReadingQuick Hits
New company Confer takes on endpoint security problem with sensors that feed into threat intelligence network
By Tim Wilson Editor in Chief, Dark Reading, 1/30/2014
Comment0 comments  |  Read  |  Post a Comment
Machine Resiliency as a Defense
Tom Quillin, Director of Cyber Security Technology & Initiatives, Intel CorporationCommentary
If you follow news on cyber security, you might be led to think PCs and endpoints have become increasingly vulnerable.
By Tom Quillin Director of Cyber Security Technology & Initiatives, Intel Corporation, 1/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Knowing Your Cyber Enemy: New Services Open Up Possibilities, But Experts Differ On Techniques, Value
Tim Wilson, Editor in Chief, Dark ReadingNews
As commercial capabilities for identifying online attackers improve, experts, service providers debate methods, costs
By Tim Wilson Editor in Chief, Dark Reading, 1/13/2014
Comment0 comments  |  Read  |  Post a Comment
Threat Intel To Deliver Some Benefits To Cyberinsurance
Robert Lemos, Technology JournalistNews
About a third of large companies have a cyberinsurance policy, but the industry still has issues measuring risks and gauging threats
By Robert Lemos Technology Journalist, 11/22/2013
Comment0 comments  |  Read  |  Post a Comment
From Event Gatherers To Network Hunters
Robert Lemos, Technology JournalistNews
Passive, wait-for-an-event defenses are no longer enough -- companies need to move to a more proactive strategy of hunting down the bad actors in their network, say experts
By Robert Lemos Technology Journalist, 11/8/2013
Comment0 comments  |  Read  |  Post a Comment
To Determine Threat Level, Context Matters
Robert Lemos, Technology JournalistNews
Computers communicating with the Amazon cloud, users logging in after hours, and the risk posed by Java; without context, evaluating threats is nearly impossible
By Robert Lemos Technology Journalist, 10/24/2013
Comment0 comments  |  Read  |  Post a Comment
Security Ratings Proliferate As Firms Seek Better Intel
Robert Lemos, Technology JournalistNews
Scoring services seek to measure the security of almost every step of the business supply chain, from suppliers and transactions to applications and services
By Robert Lemos Technology Journalist, 10/10/2013
Comment0 comments  |  Read  |  Post a Comment
Threat-Intel Sharing Services Emerge, But Challenges Remain
Robert Lemos, Technology JournalistNews
A number of services to help companies analyze threats and share intelligence have popped up, but the services have to solve some key problems
By Robert Lemos Technology Journalist, 9/26/2013
Comment0 comments  |  Read  |  Post a Comment
Countering Attacks Hiding In Denial-Of-Service Smokescreens
Robert Lemos, Technology JournalistNews
Noisy attacks are increasingly camouflaging more subtle exploits, but a well-structured incident response plan and third-party providers can help limit the noise
By Robert Lemos Technology Journalist, 9/13/2013
Comment1 Comment  |  Read  |  Post a Comment
IPv6 To Complicate Threat-Intelligence Landscape
Robert Lemos, Technology JournalistNews
Reputation-based blacklists could face exponential growth when the number of possible Internet addresses becomes, for all practical purposes, infinite
By Robert Lemos Technology Journalist, 8/30/2013
Comment0 comments  |  Read  |  Post a Comment
Researchers Seek Better Ways To Track Malware's Family Tree
Robert Lemos, Technology JournalistNews
Following a program's evolution back to the author may not yet be a reality, but computer scientists are searching for more accurate measures of the relationships between software versions
By Robert Lemos Technology Journalist, 8/15/2013
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web