Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in November 2015
How Facebook Bakes Security Into Corporate Culture
Commentary  |  11/30/2015  | 
Security is everyone's responsibility at the famous social network. These five ingredients are what make up the secret sauce.
The Youthful Side Of Hacking
Commentary  |  11/25/2015  | 
If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
Parsing What Is Reasonable In Security, Post FTC v Wyndham
Commentary  |  11/24/2015  | 
In today's regulatory climate, companies can no longer depend on technology solutions alone for example, SIEM -- to protect corporate data and customer privacy. Here's why.
Where Is Ransomware Going?
Partner Perspectives  |  11/23/2015  | 
As PCs and servers get better protected and employees more knowledgeable about the ransomware threat, criminals will go after less secure systems such as smart TVs, conferencing equipment, or other unsecured devices.
We Need A New Word For Cyber
Commentary  |  11/23/2015  | 
Its time to find an alternative for 'cyber' (an adjective or noun) before the term like 'google' -- becomes a verb.
Introducing RITA for Real Intelligence Threat Analysis
Commentary  |  11/20/2015  | 
SANS' free, new framework can help teams hunt for attackers by extending traditional signature analysis to blacklisted IP addresses and accounts that have multiple concurrent logons to multiple systems.
And Now, A Cyber Arms Race Towards Critical Infrastructure Attacks
Commentary  |  11/19/2015  | 
As traditional explosives give way to 'logic bombs,' the need to protect our industrial networks and systems has never been more important.
DDoS And The Internet's Liability Problem
Commentary  |  11/18/2015  | 
It's past time for an improved liability model to disrupt DDoS.
Must Automation Remain A Four-Letter Word?
Partner Perspectives  |  11/17/2015  | 
It doesnt have to. We just need to apply the compensating safeguards and automated controls selectively so CISOs and their security teams can comfortably embrace it.
Dont Toy With The Dark Web, Harness It
Commentary  |  11/16/2015  | 
The Dark Webs sinister allure draws outsized attention, but time-strapped security teams would benefit from knowing what's already circulating in places they don't need Tor or I2P to find.
Dark Reading Radio: A Cybersecurity Generation Gap
Commentary  |  11/16/2015  | 
Millennials--especially young women--not pursuing careers in cybersecurity due to lack of both awareness and interest.
Incidence-Response Imperative: Take Immediate Action
Partner Perspectives  |  11/12/2015  | 
Something malicious this way comes. A fast reaction can reduce your risk.
Point of Entry: The Missing Link in the Security Hiring Gap
Commentary  |  11/12/2015  | 
How misguided notions of capability and lack of access to enterprise tools discourage diversity in Infosec.
Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
Commentary  |  11/11/2015  | 
Guided by an organization's internal security experts,'algorithmic assistants' provide a powerful new way to find anomalies and patterns for detecting cyberthreat activity.
Why Threat Intelligence Feels Like A Game Of Connect Four
Commentary  |  11/10/2015  | 
In real life, solving the cybersecurity puzzle has many challenges. But shared wisdom and community defense models are making it easier to connect the dots.
Cybersecurity Skills Gap: Too Good To Be True For Job Seekers?
Commentary  |  11/9/2015  | 
New track at Black Hat Europe explores the special challenges of managing an information security career for both job hunters and job hirers.
What Flu Season Can Teach Us About Fighting Cyberattacks
Commentary  |  11/6/2015  | 
Cybersecurity doesn't have to be an arms race towards complexity if we put people front and center of the solution.
Mature & Unconfident: The Best Information Security Teams Ever!
Commentary  |  11/5/2015  | 
Security through maturity and humility is a workable philosophy with proven results for organizations that are willing to give it a try. Heres why.
BYOD 2015: Data Loss, Data Leaks & Data Breaches
Commentary  |  11/4/2015  | 
The growth of employee-owned devices in the workplace is placing new demands on enterprises struggling to protect both personal and professional data.
What Is Your Customer Data Worth?
Partner Perspectives  |  11/4/2015  | 
How to make sense of the market for stolen information.
Kicking Off A New Era For Policing Cybersecurity
Commentary  |  11/3/2015  | 
In the wake of FTC v. Wyndham, government agencies are becoming more aggressive about protecting corporate data and customer privacy. But the new rules are very much a work in progress.
IPv6 And The Growing DDoS Danger
Commentary  |  11/2/2015  | 
IPv6 and the Internet of Things have arrived -- and with them an enormous potential expansion for distributed denial-of-service (DDoS) attacks.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35397
PUBLISHED: 2021-08-04
A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending...
CVE-2021-36483
PUBLISHED: 2021-08-04
DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization.
CVE-2021-37231
PUBLISHED: 2021-08-04
A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.
CVE-2021-37232
PUBLISHED: 2021-08-04
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
CVE-2021-32813
PUBLISHED: 2021-08-03
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however...