Application Security

News & Commentary
DHS Task Force Moves Forward on Playbooks for Supply Chain Security
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The public/private task force takes early steps toward securing the end-to-end supply chain.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 11/16/2018
Comment0 comments  |  Read  |  Post a Comment
New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff, Quick Hits
Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system.
By Dark Reading Staff , 11/16/2018
Comment0 comments  |  Read  |  Post a Comment
AI Poised to Drive New Wave of Exploits
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Criminals are ready to use AI to dramatically speed the process of finding zero-day vulnerabilities in systems.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 11/16/2018
Comment0 comments  |  Read  |  Post a Comment
From Reactive to Proactive: Security as the Bedrock of the SDLC
Brian Rutledge, Principal Security Manager at SpanningCommentary
Secure code development should be a priority, not an afterthought, and adopting the software development life cycle process is a great way to start.
By Brian Rutledge Principal Security Manager at Spanning, 11/15/2018
Comment0 comments  |  Read  |  Post a Comment
Security Teams Struggle with Container Security Strategy
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Fewer than 30% of firms have more than a basic container security plan in place.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/14/2018
Comment0 comments  |  Read  |  Post a Comment
Netskope Announces Series F Funding Round
Dark Reading Staff, Quick Hits
The $168.7 million round will go toward R&D and global expansion, says cloud access security broker provider.
By Dark Reading Staff , 11/13/2018
Comment0 comments  |  Read  |  Post a Comment
RIP, 'IT Security'
Kevin Kurzawa, Senior Information Security AuditorCommentary
Information security is vital, of course. But the concept of "IT security" has never made sense.
By Kevin Kurzawa Senior Information Security Auditor, 11/13/2018
Comment0 comments  |  Read  |  Post a Comment
What You Should Know About Grayware (and What to Do About It)
Curtis Franklin Jr., Senior Editor at Dark Reading
Grayware is a tricky security problem, but there are steps you can take to defend your organization when you recognize the risk.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 11/9/2018
Comment0 comments  |  Read  |  Post a Comment
5 Things the Most Secure Software Companies Do (and How You Can Be Like Them)
Oege de Moor, CEO and Co-Founder at SemmleCommentary
What sets apart the largest and most innovative software engineering organizations? These five approaches are a good way to start, and they won't break the bank.
By Oege de Moor CEO and Co-Founder at Semmle, 11/8/2018
Comment1 Comment  |  Read  |  Post a Comment
New Side-Channel Attacks Target Graphics Processing Units
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A trio of new attacks bypass CPUs to wring data from vulnerable GPUs.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 11/7/2018
Comment0 comments  |  Read  |  Post a Comment
Checkmarx Acquires Custodela
Dark Reading Staff, Quick Hits
The purchase adds DevSecOps capabilities to a software exposure platform.
By Dark Reading Staff , 11/7/2018
Comment0 comments  |  Read  |  Post a Comment
Thoma Bravo Buys Veracode
Kelly Sheridan, Staff Editor, Dark ReadingNews
Broadcom will sell Veracode, acquired last year by CA, for $950M to Thoma Bravo as it broadens its security portfolio.
By Kelly Sheridan Staff Editor, Dark Reading, 11/5/2018
Comment1 Comment  |  Read  |  Post a Comment
Worst Malware and Threat Actors of 2018
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Two reports call out the most serious malware attacks and attackers of the year (so far).
By Curtis Franklin Jr. Senior Editor at Dark Reading, 11/2/2018
Comment3 comments  |  Read  |  Post a Comment
Cisco Reports SIP Inspection Vulnerability
Dark Reading Staff, Quick Hits
Advisory addresses active exploitation of vuln in the wild, with no clear solution in sight.
By Dark Reading Staff , 11/2/2018
Comment1 Comment  |  Read  |  Post a Comment
Speed Up AppSec Improvement With an Adversary-Driven Approach
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Stop overwhelming developers and start using real-world attack behavior to prioritize application vulnerability fixes.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/2/2018
Comment0 comments  |  Read  |  Post a Comment
FIFA Reveals Second Hack
Dark Reading Staff, Quick Hits
Successful phishing campaign leads attackers to confidential information of world soccer's governing body.
By Dark Reading Staff , 11/1/2018
Comment0 comments  |  Read  |  Post a Comment
Not Every Security Flaw Is Created Equal
Chris Eng, VP Research, Veracode, Commentary
You need smart prioritization to close the riskiest vulnerabilities. Effective DevSecOps leads the way, according to a new study.
By Chris Eng, VP Research, Veracode , 11/1/2018
Comment0 comments  |  Read  |  Post a Comment
Qualys Snaps Up Container Firm
Dark Reading Staff, Quick Hits
Plans to use Layered Insight's technology to add runtime capabilities and automated enforcement to its container security tool.
By Dark Reading Staff , 10/31/2018
Comment0 comments  |  Read  |  Post a Comment
Companies Fall Short on 2FA
Dark Reading Staff, Quick Hits
New research ranks organizations based on whether they offer two-factor authentication.
By Dark Reading Staff , 10/30/2018
Comment0 comments  |  Read  |  Post a Comment
New Report: IoT Now Top Internet Attack Target
Dark Reading Staff, Quick Hits
IoT devices are the top targets of cyberattacks -- most of which originate on IoT devices, new report finds.
By Dark Reading Staff , 10/29/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15769
PUBLISHED: 2018-11-16
RSA BSAFE Micro Edition Suite versions prior to 4.0.11 (in 4.0.x series) and versions prior to 4.1.6.2 (in 4.1.x series) contain a key management error issue. A malicious TLS server could potentially cause a Denial Of Service (DoS) on TLS clients during the handshake when a very large prime value is...
CVE-2018-18955
PUBLISHED: 2018-11-16
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resour...
CVE-2018-19311
PUBLISHED: 2018-11-16
Centreon 3.4.x allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the "Monitoring > Status Details > Services" screen.
CVE-2018-19312
PUBLISHED: 2018-11-16
Centreon 3.4.x allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI.
CVE-2018-19318
PUBLISHED: 2018-11-16
SRCMS 3.0.0 allows CSRF via admin.php?m=Admin&c=manager&a=update to change the username and password of the super administrator account.