Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in June 2019
Page 1 / 2   >   >>
How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy
Commentary  |  6/28/2019  | 
Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.
MSFT Realizes That Some Things Need to Be Changed
Larry Loeb  |  6/28/2019  | 
There are lots of directions in which various people think the field of 'identity' is heading. While some of these directions get accepted over a time period (like Zero Trust), someone always gets stuck with having to make the tools that enable a direction's implementation to occur.
Wipro Breach Actually a Whole Campaign
Larry Loeb  |  6/27/2019  | 
India's third-largest IT outsourcing company, Wipro, was been breached and boarded, and getting to the bottom of the mess wasn't easy.
Zero Trust Doesn't Trust You at All
Larry Loeb  |  6/27/2019  | 
Enterprise security practitioners who deal with identity day in and day out come together to find out the current status of the field.
Understanding & Defending Against Polymorphic Attacks
Commentary  |  6/27/2019  | 
Polymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here's why.
Office 365 Multifactor Authentication Done Right
Commentary  |  6/27/2019  | 
Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves.
Breaking the Endless Cycle of 'Perfect' Cybercrimes
Commentary  |  6/26/2019  | 
A two-step strategy for creating an attack environment that is more complex, less profitable, and more likely to expose the attacker.
Could Foster Kids Help Solve the Security Skills Shortage?
Commentary  |  6/26/2019  | 
Foster Warriors is a new nonprofit initiative focused on helping foster kids find a place in the world, and especially in the world of security. Join us!
Best Defense: 5 Key Trends in Application Security
Ameya Talwalkar  |  6/26/2019  | 
What application security must address to stay ahead of the attackers.
Developers Find Temporary Fix for OpenSSH Remote Access Software Vulnerability
Larry Loeb  |  6/26/2019  | 
The latest update from the OpenSSH developers encrypts private keys before storing them into the system memory, which will protect the keys against almost all types of side-channel attacks.
How to Avoid Becoming the Next Riviera Beach
Commentary  |  6/25/2019  | 
Be prepared by following these five steps so you don't have to pay a ransom to get your data back.
The Rise of Silence and the Fall of Coinhive
Commentary  |  6/25/2019  | 
Cryptomining will exist as long as it remains profitable. One of the most effective ways to disrupt that activity is to make it too expensive to run cryptomining malware in your network.
Never Trust, Always Verify: Demystifying Zero Trust to Secure Your Networks
Commentary  |  6/24/2019  | 
The point of Zero Trust is not to make networks, clouds, or endpoints more trusted; it's to eliminate the concept of trust from digital systems altogether.
Millions of Dell PCs at Risk Due to Software Flaw
Larry Loeb  |  6/24/2019  | 
SafeBreach found that one library of software which was used to construct Dell's SupportAssist can be tricked into loading DLL files that it really shouldn't.
The Cracking of RSA-2048 Encryption Will Come Sooner Than Had Been Thought
Larry Loeb  |  6/21/2019  | 
Advances in both QC and QC methods will see to that.
Patrolling the New Cybersecurity Perimeter
Commentary  |  6/21/2019  | 
Remote work and other developments demand a shift to managing people rather than devices.
'Democratizing' Machine Learning for Fraud Prevention & Payments Intelligence
Commentary  |  6/20/2019  | 
How fraud experts can fight cybercrime by 'downloading' their knowledge and experience into computer models.
Defense Discovered for Defending Against BGP Hijacking & Off-Path DNS Attacks
Larry Loeb  |  6/20/2019  | 
Certificate Authorities are continually getting requests from threat actors who want certificates that they aren't entitled to so that their criminal schemes may be furthered.
The Hunt for Vulnerabilities
Commentary  |  6/20/2019  | 
A road map for improving the update process will help reduce the risks from vulnerabilities.
Serverless Computing from the Inside Out
Commentary  |  6/19/2019  | 
The biggest 'serverless' risks don't stem from the technology itself. They occur when organizations respond to the adoption from the outside in.
New 'IPStorm' Malware Uses Peer-to-Peer Network for Communication
Larry Loeb  |  6/19/2019  | 
It's a whole new headache for the security team.
How Hackers Emptied Church Coffers with a Simple Phishing Scam
Commentary  |  6/19/2019  | 
Cyber thieves aren't bound by a code of ethics. They look for weak targets and high rewards, which is exactly what Saint Ambrose Catholic offered.
The Evolution of Identity
Commentary  |  6/18/2019  | 
How data and technology can help businesses make the right fraud decisions, protect people's identities, and create an improved customer experience.
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Commentary  |  6/18/2019  | 
It's time to reassess your open source management policies and processes.
XENOTIME Threat Actor Laying the Groundwork to Disrupt Utilities
Larry Loeb  |  6/17/2019  | 
Malware targets Schneider Electric's Triconex safety instrumented system.
The Life-Changing Magic of Tidying Up the Cloud
Commentary  |  6/17/2019  | 
Most companies' cloud security operations would benefit significantly from clean-up, alignment, and organization.
Sensory Overload: Filtering Out Cybersecurity's Noise
Commentary  |  6/14/2019  | 
No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.
Are US & UK Firms Keeping Up With 'Best Practice' Password Management?
Larry Loeb  |  6/14/2019  | 
Companies think that they are much safer than their actual password practices would suggest.
Preempt Shows How to Sidestep EPA Authentication
Larry Loeb  |  6/13/2019  | 
Security firm Preempt issued an advisory that showed how to conceptually bypass the Enhanced Protection for Authentication that prevents attackers from performing a relay of NT Lan Manager messages to top-level security sessions.
The CISO's Drive to Consolidation
Commentary  |  6/13/2019  | 
Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started.
The Rise of 'Purple Teaming'
Commentary  |  6/13/2019  | 
The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.
Tomorrow's Cybersecurity Analyst Is Not Who You Think
Commentary  |  6/12/2019  | 
Organizations can't just rely on diverse and cutting-edge technologies to fight adversaries. They will also need people with diverse expertise and backgrounds.
Predicting Vulnerability Weaponization
Commentary  |  6/12/2019  | 
Advances in data science are making it possible to shift vulnerability management from a reactive to a proactive discipline.
Are Consumers Afraid of Biometrics for E-Commerce?
Larry Loeb  |  6/12/2019  | 
Researchers found that 81% of consumers still favor passwords for making payments online due to concerns about the security of new biometric options.
What 3 Powerful GoT Women Teach Us about Cybersecurity
Commentary  |  6/11/2019  | 
Imagine Game of Thrones' Daenerys Targaryen, Arya Stark, and Cersei Lannister on the front lines in the real-world battleground of enterprise security.
Getting Up to Speed on Magecart
Commentary  |  6/11/2019  | 
Greater awareness of how Magecart works will give your company a leg up on the growing threat from this online credit card skimmer. Here are four places to start.
Researchers Discover Way to Hack Hardware Security Module, Gain Access to Cryptographic Keys
Larry Loeb  |  6/11/2019  | 
Everyone be cool, this is one heckuva robbery!
Digital Vigilantes Weaponize Vulnerability Disclosure
Steve Durbin  |  6/11/2019  | 
Over the next two years, vulnerability disclosure will evolve from a predominantly altruistic endeavor to one that actively damages organizations.
Unmixed Messages: Bringing Security & Privacy Awareness Together
Commentary  |  6/10/2019  | 
Security and privacy share the same basic goals, so it just makes sense to combine efforts in those two areas. But that can be easier said than done.
NSA Stresses Real Danger in BlueKeep Exploit
Larry Loeb  |  6/10/2019  | 
Botnets have been scanning for RDP servers and are using weak and reused passwords to gain access to them.
End User Lockdown: Dark Reading Caption Contest Winners
Commentary  |  6/7/2019  | 
Phishing, cybersecurity training, biometrics and casual Fridays. And the winners are ...
Study Finds Most Popular iOS Apps Are Not Encrypting Data
Larry Loeb  |  6/7/2019  | 
Wandera found that two-thirds (67.8%) of apps still disable Apple Transport Security (ATS) globally and don't set any granular exceptions for specific functions.
Cyber Talent Gap? Don't Think Like Tinder!
Commentary  |  6/6/2019  | 
If your company truly is a great place to work, make sure your help-wanted ads steer clear of these common job-listing clichs.
When Security Goes Off the Rails
Commentary  |  6/6/2019  | 
Cyber can learn a lot from the highly regulated world of rail travel. The most important lesson: the value of impartial analysis.
Researchers Seek 'Best' Vulnerability Remediation Strategy
Larry Loeb  |  6/6/2019  | 
Having to find the sweet spot between two competing forces is a delicate balancing act.
How to Get the Most Benefits from Biometrics
Commentary  |  6/5/2019  | 
Providing an easy-to-use, uniform authentication experience without passwords is simpler than you may think.
CISOs & CIOs: Better Together
Commentary  |  6/5/2019  | 
An overview of three common organizational structures illustrates how NOT to pit chief security and IT execs against each other.
Mobile Phone Motion Sensors Found to Leak Tracking Data
Larry Loeb  |  6/5/2019  | 
A user's information can be accessed by an attacker in many ways, not just from a device's system software.
Why FedRAMP Matters to Non-Federal Organizations
Commentary  |  6/4/2019  | 
Commercial companies should explore how FedRAMP can help mitigate risk as they move to the cloud.
What Cyber Skills Shortage?
Commentary  |  6/4/2019  | 
Employers can solve the skills gap by first recognizing that there isn't an archetypal "cybersecurity job" in the same way that there isn't an archetypal "automotive job." Heres how.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11583
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.
CVE-2020-11584
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.
CVE-2020-5770
PUBLISHED: 2020-08-03
Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.01 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.
CVE-2020-5771
PUBLISHED: 2020-08-03
Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious backup archive.
CVE-2020-5772
PUBLISHED: 2020-08-03
Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious package file.