Analytics // Threat Intelligence
News & Commentary
Intelligence-Sharing Suffers Growing Pains
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
For most organizations, intelligence-sharing remains mainly ad-hoc and informal -- and thus fraught with frustration and pitfalls, new report from Ponemon finds.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 4/23/2014
Comment0 comments  |  Read  |  Post a Comment
Free Scanning Tool Promises To Find Heartbleed On Any Device
Tim Wilson, Editor in Chief, Dark ReadingQuick Hits
CrowdStrike says tool identifies the flaw on web servers, VPNs, servers, routers, printers, and phones.
By Tim Wilson Editor in Chief, Dark Reading, 4/22/2014
Comment5 comments  |  Read  |  Post a Comment
Stolen Passwords Used In Most Data Breaches
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
New Verizon 2014 Data Breach Investigations Report identifies nine types of attack patterns that accounted for 93 percent of security incidents in the past decade.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 4/22/2014
Comment11 comments  |  Read  |  Post a Comment
11 Heartbleed Facts: Vulnerability Discovery, Mitigation Continue
Mathew J. Schwartz, News
Millions of websites, applications from Cisco and VMware, Google Play apps, as well as millions of Android devices are vulnerable -- and the list keeps growing.
By Mathew J. Schwartz , 4/17/2014
Comment2 comments  |  Read  |  Post a Comment
Don't Blame It On The Web Programming Platform
Kelly Jackson Higgins, Senior Editor, Dark ReadingQuick Hits
New data shows no one Web development platform generates more vulnerabilities than another -- and website security is still a problem.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 4/15/2014
Comment3 comments  |  Read  |  Post a Comment
White House Details Zero-Day Bug Policy
Mathew J. Schwartz, News
NSA denies prior knowledge of the Heartbleed vulnerability, but the White House reserves the right to withhold zero-day exploit information in some cases involving security or law enforcement.
By Mathew J. Schwartz , 4/15/2014
Comment3 comments  |  Read  |  Post a Comment
Heartbleed's Intranet & VPN Connection
Kelly Jackson Higgins, Senior Editor, Dark ReadingNews
How the game-changing crypto bug affects internal servers, clients, and VPN networks -- and what to do about it.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 4/14/2014
Comment4 comments  |  Read  |  Post a Comment
One Year Later: The APT1 Report
Nick Selby, CEO, StreetCred Software, IncCommentary
One of the most positive impacts of APT1 is the undeniable rise in the stature of the threat intelligence industry. "Threat Intelligence" is the SIEM, the NAC of 2014.
By Nick Selby CEO, StreetCred Software, Inc, 4/8/2014
Comment2 comments  |  Read  |  Post a Comment
Advanced Attacks Are The New Norm, Study Says
Tim Wilson, Editor in Chief, Dark ReadingQuick Hits
According to the Websense 2014 Threat Report, most malicious exploits now are advanced and targeted.
By Tim Wilson Editor in Chief, Dark Reading, 4/4/2014
Comment5 comments  |  Read  |  Post a Comment
Facebook Builds Its Own Threat Modeling System
Kelly Jackson Higgins, Senior Editor, Dark ReadingQuick Hits
The tool helps the social network gather, store, analyze, and react to the latest threats against it.
By Kelly Jackson Higgins Senior Editor, Dark Reading, 3/26/2014
Comment4 comments  |  Read  |  Post a Comment
Startup Confer Launches Cyberthreat Prevention Network
Tim Wilson, Editor in Chief, Dark ReadingQuick Hits
New company Confer takes on endpoint security problem with sensors that feed into threat intelligence network
By Tim Wilson Editor in Chief, Dark Reading, 1/30/2014
Comment0 comments  |  Read  |  Post a Comment
Machine Resiliency as a Defense
Tom Quillin, Director of Cyber Security Technology & Initiatives, Intel CorporationCommentary
If you follow news on cyber security, you might be led to think PCs and endpoints have become increasingly vulnerable.
By Tom Quillin Director of Cyber Security Technology & Initiatives, Intel Corporation, 1/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Knowing Your Cyber Enemy: New Services Open Up Possibilities, But Experts Differ On Techniques, Value
Tim Wilson, Editor in Chief, Dark ReadingNews
As commercial capabilities for identifying online attackers improve, experts, service providers debate methods, costs
By Tim Wilson Editor in Chief, Dark Reading, 1/13/2014
Comment0 comments  |  Read  |  Post a Comment
Threat Intel To Deliver Some Benefits To Cyberinsurance
Robert Lemos, Technology JournalistNews
About a third of large companies have a cyberinsurance policy, but the industry still has issues measuring risks and gauging threats
By Robert Lemos Technology Journalist, 11/22/2013
Comment0 comments  |  Read  |  Post a Comment
From Event Gatherers To Network Hunters
Robert Lemos, Technology JournalistNews
Passive, wait-for-an-event defenses are no longer enough -- companies need to move to a more proactive strategy of hunting down the bad actors in their network, say experts
By Robert Lemos Technology Journalist, 11/8/2013
Comment0 comments  |  Read  |  Post a Comment
To Determine Threat Level, Context Matters
Robert Lemos, Technology JournalistNews
Computers communicating with the Amazon cloud, users logging in after hours, and the risk posed by Java; without context, evaluating threats is nearly impossible
By Robert Lemos Technology Journalist, 10/24/2013
Comment0 comments  |  Read  |  Post a Comment
Security Ratings Proliferate As Firms Seek Better Intel
Robert Lemos, Technology JournalistNews
Scoring services seek to measure the security of almost every step of the business supply chain, from suppliers and transactions to applications and services
By Robert Lemos Technology Journalist, 10/10/2013
Comment0 comments  |  Read  |  Post a Comment
Threat-Intel Sharing Services Emerge, But Challenges Remain
Robert Lemos, Technology JournalistNews
A number of services to help companies analyze threats and share intelligence have popped up, but the services have to solve some key problems
By Robert Lemos Technology Journalist, 9/26/2013
Comment0 comments  |  Read  |  Post a Comment
Countering Attacks Hiding In Denial-Of-Service Smokescreens
Robert Lemos, Technology JournalistNews
Noisy attacks are increasingly camouflaging more subtle exploits, but a well-structured incident response plan and third-party providers can help limit the noise
By Robert Lemos Technology Journalist, 9/13/2013
Comment1 Comment  |  Read  |  Post a Comment
IPv6 To Complicate Threat-Intelligence Landscape
Robert Lemos, Technology JournalistNews
Reputation-based blacklists could face exponential growth when the number of possible Internet addresses becomes, for all practical purposes, infinite
By Robert Lemos Technology Journalist, 8/30/2013
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web