Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

News & Commentary
Who Gets Privileged Access & How to Enforce It
Tim Keeler, Founder and CEO, RemediantCommentary
Let's begin by re-evaluating IT infrastructures to determine who has access to what, why, and when.
By Tim Keeler Founder and CEO, Remediant, 8/20/2019
Comment0 comments  |  Read  |  Post a Comment
Towns Across Texas Hit in Coordinated Ransomware Attack
Robert Lemos, Contributing WriterNews
The state government and cybersecurity groups have mobilized to respond to a mass ransomware attack that simultaneously hit 23 different towns statewide.
By Robert Lemos Contributing Writer, 8/19/2019
Comment0 comments  |  Read  |  Post a Comment
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.Commentary
The old-school technology is experiencing new popularity, but too many people assume mainframes are inherently secure.
By Ray Overby Co-Founder & President at Key Resources, Inc., 8/15/2019
Comment3 comments  |  Read  |  Post a Comment
Why Companies Fail to Learn from Peers' Mistakes (and How They Can Change)
Anurag Kahol, CTO, BitglassCommentary
Far too often, there's a new breach in the headlines. Companies need to start learning some obvious lessons.
By Anurag Kahol CTO, Bitglass, 8/14/2019
Comment1 Comment  |  Read  |  Post a Comment
Microservices Flip App Security on Its Head
Jonathan DiVincenzo, Head of Product at Signal SciencesCommentary
With faster application deployment comes increased security considerations.
By Jonathan DiVincenzo Head of Product at Signal Sciences, 8/14/2019
Comment0 comments  |  Read  |  Post a Comment
History Doesn't Repeat Itself in Cyberspace
Nick Jovanovic, VP, Federal, for Cloud Protection and Licensing Activity at ThalesCommentary
The 10th anniversary of the US Cyber Command is an opportunity to prepare for unknowns in the rapidly changing cybersecurity landscape.
By Nick Jovanovic VP, Federal, for Cloud Protection and Licensing Activity at Thales, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
2019 Pwnie Award Winners (And Those Who Wish They Weren't)
Jai Vijayan, Contributing Writer
This year's round-up includes awards into two new categories: most under-hyped research and epic achievement.
By Jai Vijayan Contributing Writer, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
Security Flaws Discovered in 40 Microsoft-Certified Device Drivers
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Attackers can use vulnerable drivers to escalate privilege and execute malicious code in every part of the system.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2019
Sara Peters, Senior Editor at Dark ReadingNews
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
By Sara Peters Senior Editor at Dark Reading, 8/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Enterprises Must Be Wary of Ransomware Targeting Network File Shares & Cloud Assets
Ericka Chickowski, Contributing WriterNews
New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.
By Ericka Chickowski Contributing Writer, 8/7/2019
Comment1 Comment  |  Read  |  Post a Comment
Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Boeing disputes IOActive findings ahead of security firm's Black Hat USA presentation.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/7/2019
Comment0 comments  |  Read  |  Post a Comment
New Speculative Execution Vulnerability Gives CISOs a New Reason to Lose Sleep
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The vulnerability, dubbed SWAPGS, is an undetectable threat to data security, similar in some respects to Spectre and Meltdown.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/6/2019
Comment1 Comment  |  Read  |  Post a Comment
When Perceived Cybersecurity Risk Outweighs Reality
Robert Huber, Chief Security Officer at TenableCommentary
Teams need to manage perceived risks so they can focus on fighting the real fires.
By Robert Huber Chief Security Officer at Tenable, 8/6/2019
Comment0 comments  |  Read  |  Post a Comment
Mimecast Rejected Over 67 Billion Emails. Here's What It Learned
Steve Zurier, Contributing WriterNews
New research warns that security pros must guard against updates to older malware and more manipulative social-engineering techniques.
By Steve Zurier Contributing Writer, 8/6/2019
Comment3 comments  |  Read  |  Post a Comment
Demystifying New FIDO Standards & Innovations
Bojan Simic, Chief Technology Officer & Co-Founder of HYPRCommentary
Staying on top of the latest cybersecurity risks and preferred attack methods can feel impossible, but standards like FIDO2 are designed to help relieve the burden.
By Bojan Simic Chief Technology Officer & Co-Founder of HYPR, 8/1/2019
Comment0 comments  |  Read  |  Post a Comment
Why the Network Is Central to IoT Security
Jon Green, President & CTO for Security at Aruba Networks, a Hewlett Packard EnterpriseCommentary
Is there something strange about your network activity? Better make sure all of your IoT devices are under control.
By Jon Green President & CTO for Security at Aruba Networks, a Hewlett Packard Enterprise, 7/31/2019
Comment1 Comment  |  Read  |  Post a Comment
BlueKeep Exploits Appear as Security Firms Continue to Worry About Cyberattack
Robert Lemos, Contributing WriterNews
The lack of an attack has puzzled some security experts, but the general advice remains that companies should patch their vulnerable systems more quickly.
By Robert Lemos Contributing Writer, 7/30/2019
Comment0 comments  |  Read  |  Post a Comment
CISOs Must Evolve to a Data-First Security Program
Michael Coates, CEO & Co-Founder of Altitude NetworksCommentary
Such a program will require effort and reprioritization, but it will let your company fight modern-day threats and protect your most important assets.
By Michael Coates CEO & Co-Founder of Altitude Networks, 7/30/2019
Comment2 comments  |  Read  |  Post a Comment
Answer These 9 Questions to Determine if Your Data Is Safe
Chad Cragle, Information Security Officer at FormAssemblyCommentary
Data protection regulations are only going to grow tighter. Make sure you're keeping the customer's best interests in mind.
By Chad Cragle Information Security Officer at FormAssembly, 7/25/2019
Comment9 comments  |  Read  |  Post a Comment
Business Email Compromise: Thinking Beyond Wire Transfers
Kelly Sheridan, Staff Editor, Dark ReadingNews
As BEC continues to drive record-high losses, cybercriminals devise new tactics for swindling corporate targets out of millions.
By Kelly Sheridan Staff Editor, Dark Reading, 7/23/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by allenred
Current Conversations nice post
In reply to: cyber security
Post Your Own Reply
More Conversations
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-08-20
An issue was discovered in the Texas Instruments (TI) TM4C microcontroller series, such as the TM4C123. The eXecute-Only-Memory (XOM) implementation prevents code read-outs on protected memory by generating bus faults. However, single-stepping and using breakpoints is allowed in XOM-protected flash ...
PUBLISHED: 2019-08-20
The user-role plugin before 1.5.6 for WordPress has multiple XSS issues.
PUBLISHED: 2019-08-20
The wp-all-import plugin before 3.4.7 for WordPress has XSS.
PUBLISHED: 2019-08-20
The moreads-se plugin before 1.4.7 for WordPress has XSS.
PUBLISHED: 2019-08-20
The pagination plugin before 1.0.7 for WordPress has multiple XSS issues.