Vulnerabilities / Threats
News & Commentary
Dyre Trojan Adds New Sandbox-Evasion Feature
Jai Vijayan, Freelance writerNews
New tactic makes it that much harder to detect, says Seculert.
By Jai Vijayan Freelance writer, 5/1/2015
Comment1 Comment  |  Read  |  Post a Comment
CareerBuilder Attack Sends Malware-Rigged Resumes To Businesses
Jai Vijayan, Freelance writerNews
Attack displays 'simple elegance and brilliance,' security researcher say.
By Jai Vijayan Freelance writer, 4/30/2015
Comment1 Comment  |  Read  |  Post a Comment
Breaking The Security Fail Cycle
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
How security teams are evolving in the face of today's threats.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/30/2015
Comment3 comments  |  Read  |  Post a Comment
IRC Botnets Are Not Quite Dead Yet
Jai Vijayan, Freelance writerNews
The handful that still operate are more sophisticated and resilient than before, Zscaler says.
By Jai Vijayan Freelance writer, 4/29/2015
Comment2 comments  |  Read  |  Post a Comment
Big Data & The Security Skills Shortage
Peter Schlampp, VP of Products, PlatforaCommentary
Finding a security analyst with the data discovery experience to combat modern threats is like searching for the mythical unicorn. The person does not exist
By Peter Schlampp VP of Products, Platfora, 4/29/2015
Comment4 comments  |  Read  |  Post a Comment
RSA Highlighted Impending IoT Troubles
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Same mistakes made all over again with a new technology game changer, but the stakes are higher this time.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/28/2015
Comment3 comments  |  Read  |  Post a Comment
Application Layer Exfiltration Protection: A New Perspective on Firewalls
Pat Calhoun, Senior Vice President & General Manager, Network Security at Intel Security
Organizations must adopt a new way of thinking about safeguarding sensitive data from theft and unauthorized exfiltration.
By Pat Calhoun Senior Vice President & General Manager, Network Security at Intel Security, 4/28/2015
Comment2 comments  |  Read  |  Post a Comment
Note To Vendors: CISOs Donít Want Your Analytical Tools
Rick Gordon, Managing Partner, Mach37 Cyber AcceleratorCommentary
What they need are solutions that deliver prioritized recommendations and confidence in the analytical rigor behind those recommendations to take meaningful action.
By Rick Gordon Managing Partner, Mach37 Cyber Accelerator, 4/28/2015
Comment6 comments  |  Read  |  Post a Comment
As Malware Surges, U.S. Remains Biggest Source of Attacks
Jai Vijayan, Freelance writerNews
The country leads others in malicious IP, URLs and phishing sites.
By Jai Vijayan Freelance writer, 4/24/2015
Comment7 comments  |  Read  |  Post a Comment
Cybersecurity: Donít Bank On It With 3rd Parties
Greg Dickinson, CEO, HiperosCommentary
Not knowing that a contractorís employee had access to system passwords is not a valid excuse when your clientís records are stolen.
By Greg Dickinson CEO, Hiperos, 4/24/2015
Comment1 Comment  |  Read  |  Post a Comment
DHS Courts Private Sector For Threat Intelligence-Sharing
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Homeland Security NCCIC now STIX- and TAXII-enabled for automated machine-to-machine sharing of intel, agency officials told attendees at the RSA Conference.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/23/2015
Comment2 comments  |  Read  |  Post a Comment
6 Most Dangerous New Attack Techniques in 2015
Ericka Chickowski, Contributing Writer, Dark ReadingNews
SANS experts lay out the up-and-coming trends in attack patterns at RSA Conference.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/23/2015
Comment2 comments  |  Read  |  Post a Comment
From The RSA Keynote Stage, Day Two
Sara Peters, Senior Editor at Dark ReadingNews
A 9-year-old CEO hacker, a record-breaking swimmer, and a variety of ideas about data-driven security hit the RSA stage.
By Sara Peters Senior Editor at Dark Reading, 4/22/2015
Comment0 comments  |  Read  |  Post a Comment
The Bad News For Infosec In The Target Settlement
Giora Engel, VP Product & Strategy, LightCyberCommentary
The legal argument behind the $10 million Class Action lawsuit and subsequent settlement is a gross misrepresentation of how attackers operate.
By Giora Engel VP Product & Strategy, LightCyber, 4/22/2015
Comment5 comments  |  Read  |  Post a Comment
Bank Botnets Continue to Thrive One Year After Gameover Zeus Takedown
Jai Vijayan, Freelance writerNews
Features on new botnets suggest attackers have learned from the lessons of takedown.
By Jai Vijayan Freelance writer, 4/22/2015
Comment0 comments  |  Read  |  Post a Comment
Virginia Forms First State-Level Cyberthreat Intel-Sharing Organization
Dark Reading Staff, Quick Hits
Governor Terry McAuliffe today announced Virginia's new Information Sharing and Analysis Organization (ISAO).
By Dark Reading Staff , 4/21/2015
Comment0 comments  |  Read  |  Post a Comment
Health Insurersí Digital Footprint Widening Attack Surface
Peter Zavlaris, Analyst, RiskIQCommentary
Insurers are ripe targets for attackers since theyíre efficient concentrators of every kind of data needed for identity theft, credit card and insurance fraud. Hereís proof.
By Peter Zavlaris Analyst, RiskIQ, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
Waratek Wins RSA Innovation Sandbox
Sara Peters, Senior Editor at Dark ReadingNews
RSA: 10th annual event honors runtime application self protection solution for solving Java security problems.
By Sara Peters Senior Editor at Dark Reading, 4/20/2015
Comment0 comments  |  Read  |  Post a Comment
White House's Daniel 'Intrigued' By UL-Type Model For IoT Security
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Michael Daniel, the national cybersecurity coordinator and assistant to the President, talks Internet of Things security and recent Executive Orders on intel-sharing and sanctions.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/20/2015
Comment1 Comment  |  Read  |  Post a Comment
DHS: Most Organizations Need Improvement In Managing Security Risk
Rutrell Yasin, Business Technology Writer, Tech Writers BureauCommentary
At a Department of Homeland Security Summit, government and corporate security teams are taken to task for failing to address critical issues of software assurance, testing and lifecycle support.
By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 4/20/2015
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.