Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in July 2018
Page 1 / 3   >   >>
HP Launches Printer Bug Bounty Program
News  |  7/31/2018  | 
Bugcrowd will manage new vulnerability disclosure award program for HP enterprise printers.
DHS Establishes Center For Defense of Critical Infrastructure
News  |  7/31/2018  | 
Center foundational to new government-led 'collective defense' strategy for sharing and responding to cyberthreats, DHS secretary says.
Hundreds of Registry Keys Exposed to Microsoft COM Hijacking
News  |  7/31/2018  | 
Experts believe there could be thousands more in the wild.
Unified Security Data: A Simple Idea to Combat Persistent, Complex Cyberattacks
Commentary  |  7/31/2018  | 
Do you know what happens to your data when it's not in use? If the answer is no, you need to fix that.
Yale Discloses Data Breach
Quick Hits  |  7/31/2018  | 
The university discloses that someone stole personal information a long time ago.
10 More Women in Security You May Not Know But Should
Slideshows  |  7/31/2018  | 
The second installment in a series highlighting women who are driving change in cybersecurity but may not be on your radar yet.
Mimecast Snaps Up Solebit for $88 Million
Quick Hits  |  7/31/2018  | 
Purchase of threat detection firm closely follows company's acquisition of security training platform Ataata.
Accidental Cryptojackers: A Tale of Two Sites
Commentary  |  7/31/2018  | 
Why website operators need to know with whom they are doing business and how to close the loop on third-party vulnerabilities.
Russian National Sentenced to 70 Months For $4 Million Debit Card Fraud
News  |  7/30/2018  | 
Mikhail Malykhin's actions drove one company out business.
New Spectre Variant Hits the Network
News  |  7/30/2018  | 
A new proof of concept is a reminder that complex systems can be vulnerable at the most basic level.
$5 Million in Cryptocurrency Stolen in SIM Hijacking Operation
Quick Hits  |  7/30/2018  | 
College student is arrested for his alleged involvement.
University of Phoenix Poll: 20% of US Adults Have Considered Infosec Careers
Quick Hits  |  7/30/2018  | 
Many respondents could enter the field by leveraging skills they already have.
MUD: The Solution to Our Messy Enterprise IoT Security Problems?
Commentary  |  7/30/2018  | 
The 'Manufacturer Usage Description' proposal from IETF offers a promising route for bolstering security across the industry.
Automating Kernel Exploitation for Better Flaw Remediation
News  |  7/27/2018  | 
Black Hat researchers plan on open sourcing a new framework they say can help organizations get a better rein on vulnerability fixes for kernel bugs.
Imperva Plans to Purchase Prevoty
Quick Hits  |  7/27/2018  | 
Deal will bring DevOps security to the enterprise security vendor.
'Identity Has Become the Perimeter': Oracle Security SVP
News  |  7/27/2018  | 
Eric Olden, Oracle's new leader in security and identity, shares how the enterprise tech giant plans to operate in a cloud-first world.
'Fancy Bear' Targets Democratic Sen. Claire McCaskill
Quick Hits  |  7/27/2018  | 
Russian hackers have their sights on McCaskill and her staff as they gear up for her 2018 re-election campaign.
Every Week Is Shark Week in Cyberspace
Commentary  |  7/27/2018  | 
Your data, identities, and credentials are cyber chum. Here's how to protect yourself from the feeding frenzy.
Kronos Banking Trojan Resurfaces
News  |  7/26/2018  | 
Re-emergence of malware consistent with overall surge in banking malware activity this year, Proofpoint says.
5 Ways Small Security Teams Can Defend Like Fortune 500 Companies
Commentary  |  7/26/2018  | 
Keep your company protected with a mix of old- and new-school technologies.
Stealth Mango Proves Malware Success Doesn't Require Advanced Tech
News  |  7/26/2018  | 
At Black Hat USA, a pair of researchers will show how unsophisticated software can still be part of a successful surveillance campaign.
8 Steps Toward Safer Elections
Slideshows  |  7/26/2018  | 
Heres some advice from leading authorities on how state and local governments can adapt to an environment where election systems will inevitably be hacked.
Tenable Prices IPO, Raises $250 Million
News  |  7/26/2018  | 
The past year has been one of significant growth for the cybersecurity firm, which is trading under the NASDAQ symbol TENB.
CoinVault Authors Sentenced to Community Service
Quick Hits  |  7/26/2018  | 
Ransomware first began targeting victims in 2014.
LifeLock Learns Lesson from Leaky Links
Quick Hits  |  7/26/2018  | 
A Web programming problem could have exposed millions of customer email addresses.
The Double-Edged Sword of Artificial Intelligence in Security
Commentary  |  7/26/2018  | 
AI is revolutionizing cybersecurity for both defenders and attackers as hackers, armed with the same weaponized technology, create a seemingly never-ending arms race.
The ABCs of Hacking a Voting Machine
News  |  7/25/2018  | 
A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
US-CERT Warns of ERP Application Hacking
News  |  7/25/2018  | 
ERP applications such as Oracle and SAP's are open to exploit and under attack, according to a new report referenced in a US-CERT warning.
Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East
News  |  7/25/2018  | 
Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.
Google Security Updates Include Titan Hardware Key
News  |  7/25/2018  | 
At Next 2018, Google also launches context-aware access management, shielded VMs, and G Suite security center investigation tool.
The Good & Bad News About Today's Cybersecurity Investment Landscape
Commentary  |  7/25/2018  | 
Lots of things keep CISOs up at night. But instead of guessing what CISOs want, investors and vendors should incorporate customer feedback throughout product ideation and development cycles.
Google Calls Out Insecure Sites in New Chrome Version
Quick Hits  |  7/25/2018  | 
The latest version of the Chrome browser puts a label on unencrypted websites.
Securing Our Interconnected Infrastructure
Commentary  |  7/25/2018  | 
A little over a year ago, the world witnessed NotPetya, the most destructive cyberattack to date. What have we learned?
'Password Check Required'? Not So Fast
Quick Hits  |  7/25/2018  | 
The most successful phishing emails tell users to check their passwords or investigate security alerts.
New Free Chrome Plug-in Blocks Cryptojacking Browser Attacks
News  |  7/24/2018  | 
Qualys also plans Firefox, Safari, IE versions.
Trend Micro Launches Targeted Server-Side Bug Bounty Program
News  |  7/24/2018  | 
Targeted Incentive Program will pay anywhere from $25,000 to $200,000 to researchers who are first to demonstrate exploitable vulnerabilities.
How 'Projection' Slows Down the Path to Security Maturity
Commentary  |  7/24/2018  | 
A little bit of self-awareness goes a long way when it comes to evaluating a company's security maturity level. It's also a prerequisite to improving.
72% of CEOs Steal Corporate IP from Former Employers
News  |  7/24/2018  | 
Employees often take corporate IP because they feel ownership over their work, a trend security experts say is a problem.
DHS Officials: Hundreds of US Utility Victims Infiltrated by Russian Hackers
Quick Hits  |  7/24/2018  | 
Federal government officials up their count of US energy sector victims from dozens to hundreds, according to a Wall Street Journal report.
OpenWhisk at Risk: Critical Bug Leaves IBM Cloud Exposed
Quick Hits  |  7/24/2018  | 
IBM and Apache have issued patches for a vulnerability that let attackers overwrite any company's serverless code with malicious content.
New Report Shows Pen Testers Usually Win
News  |  7/24/2018  | 
Pen testers are successful most of the time, and it's not all about stolen credentials, according to a new report based on hundreds of tests.
7 Ways to Better Secure Electronic Health Records
Slideshows  |  7/24/2018  | 
Healthcare data is prime targets for hackers. What can healthcare organizations do to better protect all of that sensitive information?
Threat Hunting: Rethinking 'Needle in a Haystack' Security Defenses
Commentary  |  7/24/2018  | 
In cyber, needles (that is, threats) can disappear quickly, for a variety of reasons, and long often after hackers have completed what they came to do.
Microsoft, Google, Facebook, Twitter Launch Data Transfer Project
News  |  7/23/2018  | 
The open-source Data Transfer Project, intended to simplify and protect data transfer across apps, comes at a sensitive time for many of the participating organizations.
Software is Achilles Heel of Hardware Cryptocurrency Wallets
News  |  7/23/2018  | 
Upcoming Black Hat talk will detail software vulnerabilities that can put private cryptocurrency wallets and currency exchange services at risk.
24 Sentenced in India-Based Call Center Operation
Quick Hits  |  7/23/2018  | 
The scheme targeted US residents with fraudulent phone calls and conned victims out of hundreds of millions of dollars.
London Calling with New Strategies to Stop Ransomware
Commentary  |  7/23/2018  | 
The new London Protocol from the Certificate Authority Security Council/Browser Forum aims to minimize the possibility of phishing activity on high-value identity websites.
Two-Thirds of Organizations Hit in Supply-Chain Attacks
Quick Hits  |  7/23/2018  | 
New global survey by CrowdStrike shows the average cost of a software supply chain attack is $1.1 million.
What the Incident Responders Saw
News  |  7/20/2018  | 
New report on IR professionals' experiences reveals just how advanced attackers, such as nation-state hackers, dig in even after they're detected.
US Intel Officials Share Their National Cybersecurity Concerns
News  |  7/20/2018  | 
Leaders in the security sector discuss the most pressing cyberthreats threatening the United States and what can be done to mitigate them.
Page 1 / 3   >   >>


Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.