2018 RSA Conference: Execs Push Cooperation, Culture & Civilian Safety
8 Ways Hackers Monetize Stolen Data
The Role of KPIs in Incident Response
Stats on the Cybersecurity Skills Shortage: How Bad Is It, Really?
7 Steps to a Smooth, Secure Cloud Transition
News & Commentary
Coviello: Modern Security Threats are 'Less About the Techniques'
Kelly Sheridan, Staff Editor, Dark ReadingNews
Today's attack surface is broader, more open, and demands a proactive approach to security, according to former RSA chairman Art Coviello.
By Kelly Sheridan Staff Editor, Dark Reading, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
Deconstructing the Possibilities and Realities of Enterprise IoT Security
Bill Kleyman, Chief Technology Officer, MTM TechnologiesCommentary
Organizations are rushing to leverage Internet of Things solutions but struggle to design the information technology architectures that will lock down the data these devices create.
By Bill Kleyman Chief Technology Officer, MTM Technologies, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
MEDantex Healthcare Transcription Firm Accidentally Exposes Medical Records
Kelly Sheridan, Staff Editor, Dark ReadingQuick Hits
Exposed data likely the result of a flawed system rebuild after a recent ransomware attack on the company.
By Kelly Sheridan Staff Editor, Dark Reading, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
Ukrainian Energy Ministry Website Suffers Ransomware Attack
Dark Reading Staff, Quick Hits
Attackers sent a message in English demanding ransom in Bitcoin.
By Dark Reading Staff , 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Buzz Phrase Bingo
Ericka Chickowski, Contributing Writer, Dark Reading
The RSA Conference expo was chock full of vendors showing off their wares with language as colorful as the blinky lights on a SOC dashboard.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
'Stresspaint' Targets Facebook Credentials
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
New malware variant goes after login credentials for popular Facebook pages.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
It's Time to Take GitHub Threats Seriously
Kumar Saurabh, CEO and co-founder of LogicHubCommentary
There's a good chance your company has projects on the source code management system, but the casual way many developers use GitHub creates security issues.
By Kumar Saurabh CEO and co-founder of LogicHub, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
Golden Galleon Raids Maritime Shipping Firms
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A new Nigerian criminal gang is launching attacks on the maritime industry.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
Threat Intel: Finding Balance in an Overcrowded Market
Kelly Sheridan, Staff Editor, Dark ReadingNews
Industry insiders discuss how threat intelligence has changed and what may happen as the market becomes increasingly saturated.
By Kelly Sheridan Staff Editor, Dark Reading, 4/23/2018
Comment1 Comment  |  Read  |  Post a Comment
Threat Actors Turn to Blockchain Infrastructure to Host & Hide Malicious Activity
Jai Vijayan, Freelance writerNews
.bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says.
By Jai Vijayan Freelance writer, 4/23/2018
Comment0 comments  |  Read  |  Post a Comment
New Survey Shows Hybrid Cloud Confidence
Dark Reading Staff, Quick Hits
Executives are mostly confident in their hybrid cloud security, according to the results of a new survey.
By Dark Reading Staff , 4/23/2018
Comment0 comments  |  Read  |  Post a Comment
Digital Identity Makes Headway Around the World
Dan Puterbaugh, Senior Legal Advocate for Adobe Document CloudCommentary
The US is lagging behind the digital ID leaders.
By Dan Puterbaugh Senior Legal Advocate for Adobe Document Cloud, 4/23/2018
Comment0 comments  |  Read  |  Post a Comment
IDS & IPS: Two Essential Security Measures
Diana Shtil, Senior Manager, Product Marketing, Gigamon
To protect business networks, one line of security isn't enough.
By Diana Shtil Senior Manager, Product Marketing, Gigamon, 4/23/2018
Comment0 comments  |  Read  |  Post a Comment
Cybercrime Economy Generates $1.5 Trillion a Year
Kelly Sheridan, Staff Editor, Dark ReadingNews
Threat actors generate, launder, spend, and reinvest more than $1.5 trillion in illicit funds, according to a new study on cybercrime's 'web of profit.'
By Kelly Sheridan Staff Editor, Dark Reading, 4/20/2018
Comment0 comments  |  Read  |  Post a Comment
Trust: The Secret Ingredient to DevSecOps Success
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Security practitioners must build trusted relationships with developers and within cross-functional DevOps teams to get themselves embedded into continuous software delivery processes.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/20/2018
Comment0 comments  |  Read  |  Post a Comment
SunTrust Ex-Employee May Have Stolen Data on 1.5 Million Bank Clients
Dark Reading Staff, Quick Hits
Names, addresses, phone numbers, account balances, may have been exposed.
By Dark Reading Staff , 4/20/2018
Comment4 comments  |  Read  |  Post a Comment
DNC Sues Guccifer 2.0, Russian Federation & Trump Campaign for Election Conspiracy
Dark Reading Staff, Quick Hits
DNC first hacked by Russians in 2015, according to the filing.
By Dark Reading Staff , 4/20/2018
Comment0 comments  |  Read  |  Post a Comment
Biometrics Are Coming & So Are Security Concerns
Michael Fauscette, Chief Research Officier at G2 CrowdCommentary
Could these advanced technologies be putting user data at risk?
By Michael Fauscette Chief Research Officier at G2 Crowd, 4/20/2018
Comment0 comments  |  Read  |  Post a Comment
At RSAC, SOC 'Sees' User Behaviors
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Instruments at the RSA Security Operations Center give analysts insight into attendee behavior on an open network.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/20/2018
Comment0 comments  |  Read  |  Post a Comment
Microsoft CISO Talks Threat Intel, 'Data Inclusion'
Kelly Sheridan, Staff Editor, Dark ReadingNews
Dark Reading caught up with Microsoft's Bret Arsenault to discuss intelligence, identity, and the need to leverage more diverse datasets.
By Kelly Sheridan Staff Editor, Dark Reading, 4/19/2018
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
IDS & IPS: Two Essential Security Measures
To protect business networks, one line of security isn't enough. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack. Read >>
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Dark Reading Live EVENTS
Dark Reading Security Pro Summit at Interop ITX 2018
Produced by the Dark Reading Team - The Security Pro Summit is an opportunity for IT security professionals to take a deeper dive into cyber security defense, learning from experts about advanced methods for detecting and responding to new threats.
Topics that will be discussed:
  • Improving Threat Analysis and Implement Threat Hunting Practices
  • Optimizing Vulnerability Detection & Remediation
  • Getting Better Performance From Your Security Operations Center
  • Plus, much more
Cartoon
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Flash Poll
Video
Slideshows
Twitter Feed