Threat Intelligence

News & Commentary
VC Investments in Cybersecurity Hit Record Highs in 2018
Jai Vijayan, Freelance writerNews
But rate of funding appears unsustainable, according to Strategic Cyber Ventures.
By Jai Vijayan Freelance writer, 1/18/2019
Comment0 comments  |  Read  |  Post a Comment
8 Tips for Monitoring Cloud Security
Kelly Sheridan, Staff Editor, Dark Reading
Cloud security experts weigh in with the practices and tools they prefer to monitor and measure security metrics in the cloud.
By Kelly Sheridan Staff Editor, Dark Reading, 1/18/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Launches New Azure DevOps Bug Bounty Program
Dark Reading Staff, Quick Hits
A new program will pay bounties of up to $20,000 for new critical bugs in the company's Azure DevOps systems and services.
By Dark Reading Staff , 1/17/2019
Comment0 comments  |  Read  |  Post a Comment
'We Want IoT Security Regulation,' Say 95% of IT Decision-Makers
Sara Peters, Senior Editor at Dark ReadingNews
New global survey shows businesses are valuing IoT security more highly, but they are still challenged by IoT data visibility and privacy.
By Sara Peters Senior Editor at Dark Reading, 1/17/2019
Comment0 comments  |  Read  |  Post a Comment
Oklahoma Data Leak Compromises Years of FBI Data
Dark Reading Staff, Quick Hits
The Oklahoma Securities Commission accidentally leaked 3 TB of information, including data on years of FBI investigations.
By Dark Reading Staff , 1/16/2019
Comment0 comments  |  Read  |  Post a Comment
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard TechnologiesCommentary
When it comes to acceptable circumstances for government disclosure of zero-days, the new Vulnerabilities Equity Process might be the accountability practice security advocates have been waiting for.
By Ricardo Arroyo Senior Technical Product Manager, Watchguard Technologies, 1/16/2019
Comment1 Comment  |  Read  |  Post a Comment
Fortnite Players Compromised Via Epic Games Vulnerability
Kelly Sheridan, Staff Editor, Dark ReadingNews
Bugs in Epic Games' platform could let intruders take over players' accounts, view personal data, and/or buy in-game currency.
By Kelly Sheridan Staff Editor, Dark Reading, 1/16/2019
Comment1 Comment  |  Read  |  Post a Comment
7 Privacy Mistakes That Keep Security Pros on Their Toes
Steve Zurier, Freelance Writer
When it comes to privacy, it's the little things that can lead to big mishaps.
By Steve Zurier Freelance Writer, 1/15/2019
Comment0 comments  |  Read  |  Post a Comment
Former IBM Security Execs Launch Cloud Data Security Startup
Kelly Sheridan, Staff Editor, Dark ReadingNews
Sonrai Security, the brainchild of two execs from IBM Security and Q1 Labs, debuts with $18.5 million in Series A funding.
By Kelly Sheridan Staff Editor, Dark Reading, 1/15/2019
Comment0 comments  |  Read  |  Post a Comment
Radiflow: New Approach for Classifying OT Attack Flaws
Dark Reading Staff, Quick Hits
The firm says risk assessment should begin with understanding attacker taxonomy and continue with vulnerability analysis.
By Dark Reading Staff , 1/14/2019
Comment0 comments  |  Read  |  Post a Comment
Facebook Faces Action From German Watchdog
Dark Reading Staff, Quick Hits
German antitrust regulators prepare to require changes from Facebook regarding privacy and personal information.
By Dark Reading Staff , 1/14/2019
Comment1 Comment  |  Read  |  Post a Comment
Government Shutdown Brings Certificate Lapse Woes
Curtis Franklin Jr., Senior Editor at Dark ReadingQuick Hits
Among the problems: TLS certificates are expiring and websites are becoming inaccessible.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 1/11/2019
Comment2 comments  |  Read  |  Post a Comment
NotPetya Victim Mondelez Sues Zurich Insurance for $100 Million
Dark Reading Staff, Quick Hits
Mondelez files lawsuit after Zurich rejects claim for damages from massive ransomware attack.
By Dark Reading Staff , 1/11/2019
Comment7 comments  |  Read  |  Post a Comment
Who Takes Responsibility for Cyberattacks in the Cloud?
Kelly Sheridan, Staff Editor, Dark ReadingNews
A new CSA report addresses the issue of breach responsibility as more organizations move ERP application data the cloud.
By Kelly Sheridan Staff Editor, Dark Reading, 1/11/2019
Comment2 comments  |  Read  |  Post a Comment
Ryuk Ransomware Attribution May Be Premature
Kelly Sheridan, Staff Editor, Dark ReadingNews
The eagerness to tie recent Ryuk ransomware attacks to a specific group could be rushed, researchers say.
By Kelly Sheridan Staff Editor, Dark Reading, 1/10/2019
Comment0 comments  |  Read  |  Post a Comment
Consumers Demand Security from Smart Device Makers
Kelly Sheridan, Staff Editor, Dark ReadingNews
Poll shows individuals want better security from IoT device manufacturers as connected products flood the market.
By Kelly Sheridan Staff Editor, Dark Reading, 1/10/2019
Comment0 comments  |  Read  |  Post a Comment
Google: G Suite Now Alerts Admins to Data Exfiltration
Dark Reading Staff, Quick Hits
New additions to the G Suite alert center are intended to notify admins of phishing and data exports.
By Dark Reading Staff , 1/10/2019
Comment0 comments  |  Read  |  Post a Comment
Magecart Mayhem Continues in OXO Breach
Dark Reading Staff, Quick Hits
The home goods company confirmed users' data may have been compromised during multiple time frames over a two-year period.
By Dark Reading Staff , 1/9/2019
Comment0 comments  |  Read  |  Post a Comment
Remote Code Execution Bugs Are Primary Focus of January Patch Tuesday
Kelly Sheridan, Staff Editor, Dark ReadingNews
This month's security update includes seven patches ranked Critical and one publicly known vulnerability.
By Kelly Sheridan Staff Editor, Dark Reading, 1/8/2019
Comment0 comments  |  Read  |  Post a Comment
Humana Breaches Reflect Chronic Credential Theft in Healthcare
Kelly Sheridan, Staff Editor, Dark ReadingNews
A series of 2018 cybersecurity incidents shows credential stuffing is a trend to watch among healthcare organizations.
By Kelly Sheridan Staff Editor, Dark Reading, 1/8/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He just showed up at my doorstep one day without a geotag."
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.