Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in April 2015
Page 1 / 2   >   >>
Breaking The Security Fail Cycle
News  |  4/30/2015  | 
How security teams are evolving in the face of today's threats.
Social Engineering Defenses: Reducing The Human Element
Commentary  |  4/30/2015  | 
Most security awareness advice is terrible, just plain bad, and not remotely feasible for your average user.
Wi-Fi Woes Continue To Plague Infosec
News  |  4/30/2015  | 
Several pieces of research coincide to send the message that hotspot connectivity is probably always going to be a sore spot for security.
IRC Botnets Are Not Quite Dead Yet
News  |  4/29/2015  | 
The handful that still operate are more sophisticated and resilient than before, Zscaler says.
Big Data & The Security Skills Shortage
Commentary  |  4/29/2015  | 
Finding a security analyst with the data discovery experience to combat modern threats is like searching for the mythical unicorn. The person does not exist
RSA Highlighted Impending IoT Troubles
News  |  4/28/2015  | 
Same mistakes made all over again with a new technology game changer, but the stakes are higher this time.
Bringing Tokenization To Secure Payments & Beyond
News  |  4/28/2015  | 
HYPR aims to do for everything else what ApplePay has done for payments
Cisco Offers Free Decryption Tool For Ransomware Victims
News  |  4/28/2015  | 
Tool decrypts, unlocks files hit by TeslaCrypt ransomware attacks.
To Evangelize Security, Get Out Of Your Comfort Zone
Commentary  |  4/28/2015  | 
If security professionals want to change corporate attitudes and culture, they need to step out of the echo chamber
Application Layer Exfiltration Protection: A New Perspective on Firewalls
Partner Perspectives  |  4/28/2015  | 
Organizations must adopt a new way of thinking about safeguarding sensitive data from theft and unauthorized exfiltration.
Note To Vendors: CISOs Dont Want Your Analytical Tools
Commentary  |  4/28/2015  | 
What they need are solutions that deliver prioritized recommendations and confidence in the analytical rigor behind those recommendations to take meaningful action.
Hacking The Real Mobile Threats
News  |  4/27/2015  | 
Mobile malware remains a mess, but the actual threat depends on where you live and where you get your apps.
Interop: Understand Your Attackers For Better Network Defense
News  |  4/27/2015  | 
Knowing who will target you is key in network security prioritization.
Third-Party Risk and Organizational Situational Awareness
Partner Perspectives  |  4/27/2015  | 
A rigorous risk management approach will help organizations understand the potential risks posed by their partners.
Twitter's Top 10 Social CISOs
Slideshows  |  4/27/2015  | 
If you work in information security today, you're on Twitter. Or are you?
As Malware Surges, U.S. Remains Biggest Source of Attacks
News  |  4/24/2015  | 
The country leads others in malicious IP, URLs and phishing sites.
Smartphone Security Shootout
News  |  4/24/2015  | 
Researcher compared Apple iOS, Android, Windows smartphones for business use privacy and security.
Defense Secretary Outlines New Cybersecurity Strategy
News  |  4/24/2015  | 
Russian hackers were caught infiltrating unclassified military networks earlier this year, he said.
Cybersecurity: Dont Bank On It With 3rd Parties
Commentary  |  4/24/2015  | 
Not knowing that a contractors employee had access to system passwords is not a valid excuse when your clients records are stolen.
DHS Courts Private Sector For Threat Intelligence-Sharing
News  |  4/23/2015  | 
Homeland Security NCCIC now STIX- and TAXII-enabled for automated machine-to-machine sharing of intel, agency officials told attendees at the RSA Conference.
Behavioral Biometrics On The Rise At RSA Conference
News  |  4/23/2015  | 
Harder to spoof and easier on users, behavioral biometrics may be bigger than passwords soon.
6 Most Dangerous New Attack Techniques in 2015
News  |  4/23/2015  | 
SANS experts lay out the up-and-coming trends in attack patterns at RSA Conference.
Government Giving 'No More Free Passes' To Cybercriminals
News  |  4/22/2015  | 
At RSA Conference Wednesday, Assistant Attorney General for National Security John Carlin explained the government's new "all tools approach" to cracking down on cyberespionage and other crime.
From The RSA Keynote Stage, Day Two
News  |  4/22/2015  | 
A 9-year-old CEO hacker, a record-breaking swimmer, and a variety of ideas about data-driven security hit the RSA stage.
Golden Hour Incident Response Agility
Partner Perspectives  |  4/22/2015  | 
Security leaders must encourage and integrate data, processes, and controls to facilitate comprehension and investment of precious human capital in higher-level tasks.
The Bad News For Infosec In The Target Settlement
Commentary  |  4/22/2015  | 
The legal argument behind the $10 million Class Action lawsuit and subsequent settlement is a gross misrepresentation of how attackers operate.
The Rise of Counterintelligence in Malware Investigations
Partner Perspectives  |  4/22/2015  | 
The key to operationalizing cybersecurity threat intelligence rests in the critical thinking that establishes that a given indicator is, in fact, malicious.
Bank Botnets Continue to Thrive One Year After Gameover Zeus Takedown
News  |  4/22/2015  | 
Features on new botnets suggest attackers have learned from the lessons of takedown.
Zero-Day Malvertising Attack Went Undetected For Two Months
News  |  4/21/2015  | 
Researchers at Malwarebytes tracked stealthy attack campaign that infected some major websites with malicious ads harboring ransomware.
BBVA CISOs Give Tips For Securing 'Digital Bank'
News  |  4/21/2015  | 
At RSA conference today, CISOs at the multinational financial organization describe security strategy.
RSA: Follow Keynote Sessions on Dark Reading
News  |  4/21/2015  | 
From the Cryptographer's Panel to the RSA CEO's advice for the security industry, here's how the conference kicked off in San Francisco Tuesday.
Virginia Forms First State-Level Cyberthreat Intel-Sharing Organization
Quick Hits  |  4/21/2015  | 
Governor Terry McAuliffe today announced Virginia's new Information Sharing and Analysis Organization (ISAO).
Health Insurers Digital Footprint Widening Attack Surface
Commentary  |  4/21/2015  | 
Insurers are ripe targets for attackers since theyre efficient concentrators of every kind of data needed for identity theft, credit card and insurance fraud. Heres proof.
Waratek Wins RSA Innovation Sandbox
News  |  4/20/2015  | 
RSA: 10th annual event honors runtime application self protection solution for solving Java security problems.
White House's Daniel 'Intrigued' By UL-Type Model For IoT Security
News  |  4/20/2015  | 
Michael Daniel, the national cybersecurity coordinator and assistant to the President, talks Internet of Things security and recent Executive Orders on intel-sharing and sanctions.
DHS: Most Organizations Need Improvement In Managing Security Risk
Commentary  |  4/20/2015  | 
At a Department of Homeland Security Summit, government and corporate security teams are taken to task for failing to address critical issues of software assurance, testing and lifecycle support.
APT Group 'Pawn Storm' Ratchets Up Attacks
News  |  4/17/2015  | 
Threat actors have set up several new C&C servers and dozens of new malicious URLs -- and now targeting White House staffers, Trend Micro says.
Inside the 4 Most Common Threat Actor Tools
Commentary  |  4/17/2015  | 
How do you prevent your environment from becoming the next target? Turn the tables on your attackers.
Popular Home Automation System Backdoored Via Unpatched Flaw
News  |  4/16/2015  | 
Malicious firmware update could lead to device, full home network 0wnage, researcher will show next week at the RSA Conference.
7 Deadly Sins That Get Users Hacked
Slideshows  |  4/16/2015  | 
How users and their endpoints are leveraged by the bad guys to eventually find their way to critical data
Breach Defense Playbook
Partner Perspectives  |  4/16/2015  | 
How to be smart about defending against your next attack.
Microsoft Zero-Day Bug Being Exploited In The Wild
News  |  4/16/2015  | 
As attacks mount, and over 70 million websites remain vulnerable, advice is "fix now."
Harnessing The Power Of Cyber Threat Intelligence
Commentary  |  4/16/2015  | 
Here are six real-world examples of how changing your modus operandi from reactive to proactive can drive rapid response to the threats that matter.
How Ionic Says It Makes Data Breaches Irrelevant
News  |  4/15/2015  | 
Ionic Security goes public with a data security platform that manages trillions of encryption keys and enables a user to sign each pixel with its own unique key.
HackerOne Now Offers Bounties For New Bug Discovery Tools And Techniques
News  |  4/15/2015  | 
Tools are a more cost-efficient option for finding bugs in mature products, new research shows.
Predictive Analytics: The Future Is Now
Partner Perspectives  |  4/15/2015  | 
Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest stages.
Youth, Apathy, And Salary Dictate Mobile Threats To Business
News  |  4/15/2015  | 
Mobile cyberattacks may not be a thing today, but a new study shows how vulnerable businesses are via user smartphones and tablets.
Why Standardized Threat Data Will Help Stop the Next Big Breach
Commentary  |  4/15/2015  | 
Adopting industry standards for threat intelligence will reduce a lot of the heavy lifting and free cyber security first responders to focus on what they do best.
'APT-On-APT' Action
News  |  4/14/2015  | 
New spin on the cyber espionage attack: spies hacking other spies for information.
Threat Intelligence Is a Two-Way Street
Partner Perspectives  |  4/14/2015  | 
Intelligence analysis should be looked upon as less of a service and more of a partnership.
Page 1 / 2   >   >>


I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2079
PUBLISHED: 2019-11-22
A cross-site request forgery (CSRF) vulnerability in the Activity module 6.x-1.x for Drupal.
CVE-2019-11325
PUBLISHED: 2019-11-21
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
CVE-2019-18887
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.
CVE-2019-18888
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. T...
CVE-2019-18889
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. Serializing certain cache adapter interfaces could result in remote code injection. This is related to symfony/cache.