Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in July 2016
<<   <   Page 3 / 3
Finance, Healthcare,Tech Sectors Highest Users Of Encryption, Survey Says
Quick Hits  |  7/6/2016  | 
Ponemon/Thales survey shows highly regulated industries are catching on.
What Security Really Looks Like In Small- To Midsized Businesses
Slideshows  |  7/6/2016  | 
Data from internal and external risk assessments provides some insight into how working with SMBs can be risky if security problems aren't uncovered and addressed.
Diagnosis SOC-atrophy: What To Do When Your Security Operation Center Gets Sick
Commentary  |  7/6/2016  | 
Whether its due to lack of attention, poor capital planning or alert fatigue, there are lots of reasons why an SOC can become unhealthy. Heres how to make it better.
US-CERT Issues Alert Over Severe Security Bugs In Symantec, Norton Products
Quick Hits  |  7/6/2016  | 
Newly discovered--and now patched--flaws in popular security software raises alarm.
So You Want To Be A Penetration Tester
News  |  7/6/2016  | 
Penetration testers must have an innate curiosity of how networked systems work coupled with a solid understanding of IT operations. It also helps to be able to think like an attacker.
West Point Trains Female Cadets For Cyber Branch
News  |  7/5/2016  | 
An internship at a Silicon Valley startup is one program aimed at helping close the cybersecurity skills gap.
A Closer Look At Microsoft's Proposed Norms For Cybersecurity
News  |  7/5/2016  | 
Microsoft last month outlined steps companies can take to collaborate on cybersecurity, following its proposed norms for nation-states.
Comey: No Evidence Clinton Email Server Was Hacked, But Still 'Possible'
Quick Hits  |  7/5/2016  | 
The FBI does not recommend charges against Hillary Clinton after investigation into use of her personal email server.
How Not To Write A Pen Test RFP
Commentary  |  7/5/2016  | 
The downside of a failed request for a penetration test proposal is a no-win situation for everyone. Here are five common mistakes to avoid.
6 Ways To Keep Androids Safe
Slideshows  |  7/3/2016  | 
Security managers have their hands full protecting Android devices, but there are common sense steps they can take to beat back attackers.
Big Business Ransomware: A Lucrative Market in the Underground Economy
Commentary  |  7/1/2016  | 
Why lock and/or pilfer a persons files worth hundreds of dollars when corporate data is infinitely more valuable?
Chinas Economic Cyber-Spying Drops Post Sept Talks: US Official
Quick Hits  |  7/1/2016  | 
U.S. Assistant Attorney General John Carlin's statement finds support in FireEye report of a 90% fall in China-based hacking.
5 Things To Consider With A Threat Hunting Program
News  |  7/1/2016  | 
A change in mindset and the ability to think like a malicious hacker are two key requirements.
Ukraines Central Bank Issued Hacking Alert In April
Quick Hits  |  7/1/2016  | 
Countrys chief financial body told lenders to strengthen security in wake of cyberattack on bank via SWIFT.
<<   <   Page 3 / 3


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24028
PUBLISHED: 2021-04-14
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
CVE-2021-29370
PUBLISHED: 2021-04-13
A UXSS was discovered in the Thanos-Soft Cheetah Browser in Android 1.2.0 due to the inadequate filter of the intent scheme. This resulted in Cross-site scripting on the cheetah browser in any website.
CVE-2021-3460
PUBLISHED: 2021-04-13
The Motorola MH702x devices, prior to version 2.0.0.301, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.
CVE-2021-3462
PUBLISHED: 2021-04-13
A privilege escalation vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could allow unauthorized access to the driver's device object.
CVE-2021-3463
PUBLISHED: 2021-04-13
A null pointer dereference vulnerability in Lenovo Power Management Driver for Windows 10, prior to version 1.67.17.54, that could cause systems to experience a blue screen error.