Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in September 2013
Pen Testing: Making Passion A Priority
Commentary  |  9/30/2013  | 
What sets real penetration testers apart is their motivation and willingness to lose themselves in something they love
Commerce In A World Without Trust
Commentary  |  9/29/2013  | 
The trust model underlying online commerce has been threatened by the constant attacks on information providers used to authenticate consumers. Is the Internet as secure as it needs to be anymore?
Fixating On The Edges
Commentary  |  9/26/2013  | 
Security folks tend to concentrate on their inability to block improbable attacks, while forgetting to focus on the attacks they're most likely to see
Flash Storage Has Special Security Needs
Commentary  |  9/26/2013  | 
Over-provisioning and bad-block marking can leave flash storage devices vulnerable to data theft. Here are workarounds.
You Are Not Over Budget -- You Underestimated
Commentary  |  9/25/2013  | 
When forces align to underfund IT projects, they guarantee an ugly finish
The Big Data Is The New Normal
Commentary  |  9/24/2013  | 
Big data, not relational, is the new platform of choice
Dolloping Out Threat Intelligence
Commentary  |  9/21/2013  | 
When too much of a good thing causes confusion and setbacks
(ISC)2 Congress Addresses Security's People Problems
Commentary  |  9/20/2013  | 
Annual (ISC)2 conference puts technology aside to focus on the human side of security
It's New And Shiny. Be Afraid. Be Very Afraid.
Commentary  |  9/19/2013  | 
In the age of page views and breaking news, we have to reserve judgement until the facts emerge. Apple's Touch ID launch is just another example of fear-mongers favoring FUD over fact
Grand Theft Oh No: When Online Gamers Attack
Commentary  |  9/17/2013  | 
A new report says the tactics players use to slow down the competition may be trained on your site. Here's how to protect yourself.
For Security Pros, Maintaining Credibility Means Walking A Fine Line
Commentary  |  9/16/2013  | 
In security, crying wolf too often -- or too infrequently -- can both lead to big trouble
The NSA And Your Cloud Data: Navigating The Noise
Commentary  |  9/12/2013  | 
Revelations about the reach of the National Security Agency have made waves, but don't get overwhelmed.
Federal DDoS Warnings Are Outdated
Commentary  |  9/11/2013  | 
We shouldn't be relying on sporadic government warnings about potential distributed denial of service attacks. Having a comprehensive DDoS plan already in place is security 101.
So You Wanna Be A Pen Tester?
Commentary  |  9/9/2013  | 
Like anything you set out to do, it's best to start with the fundamentals
Dark Reading Launches New Tech Center On Security Analytics
Commentary  |  9/9/2013  | 
Dark Reading's new Security Analytics Tech Center offers a closer look at forensics, big data, and incident response
PII And Entitlement Management
Commentary  |  9/9/2013  | 
Data discovery and entitlement tools offer a better alternative to role-based access reports for compliance
Yet Another Reason To Hate Online Ads
Commentary  |  9/8/2013  | 
Through the magic of JavaScript and ad networks, research presented at Black Hat by Jeremiah Grossman and Matt Johansen shows how to build a huge botnet quickly -- and then the fun begins
Red Teaming the Electric Grid
Commentary  |  9/3/2013  | 
Tom Parker explores the complexities of an attack against the US bulk electric system.
An Unrestricted Syria
Commentary  |  9/3/2013  | 
Cyber on the table for Syria's possible response to a U.S. missile strike?
Energy Dept. Breach: Let's Get Back To Basics
Commentary  |  9/3/2013  | 
What can lack of internal cooperation and insufficient IT resources add up to create? Unpatched servers.
Software Patches Eat Government IT's Lunch
Commentary  |  9/3/2013  | 
The software industry's publish-now, update-later approach exacts a huge toll on government IT leaders like Robert Jack, CIO of the U.S. Marine Corps.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...
CVE-2021-3169
PUBLISHED: 2021-07-23
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
CVE-2020-20741
PUBLISHED: 2021-07-23
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if t...
CVE-2021-25808
PUBLISHED: 2021-07-23
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.