Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Application Security
Page 1 / 2   >   >>
Want to Improve Cloud Security? It Starts with Logging
Commentary  |  4/3/2020  | 
Remedying the "garbage in, garbage out" problem requires an understanding of what is causing the problem in the first place.
A Day in The Life of a Pen Tester
News  |  4/2/2020  | 
Two penetration testers share their day-to-day responsibilities, challenges they encounter, and the skills they value most on the job.
Bad Bots Build Presence Across the Web
Quick Hits  |  4/2/2020  | 
Bots that mimic human behavior are driving a growing percentage of website traffic while contributing to an avalanche of misinformation.
Companies Are Failing to Deploy Key Solution for Email Security
News  |  4/2/2020  | 
A single -- albeit complex-to-deploy -- technology could stop the most expensive form of fraud, experts say. Why aren't more companies adopting it?
Vulnerability Researchers Focus on Zoom App's Security
News  |  4/2/2020  | 
With videoconferencing's rise as an essential tool for remote work comes a downside: more security scrutiny, which has turned up a number of security weaknesses.
Defense Evasion Dominated 2019 Attack Tactics
News  |  3/31/2020  | 
Researchers mapped tactics and techniques to the MITRE ATT&CK framework to determine which were most popular last year.
Data from 5.2M Marriott Loyalty Program Members Hit by Breach
Quick Hits  |  3/31/2020  | 
The data was breached through the credentials of two franchisee employees.
Patching Poses Security Problems with Move to More Remote Work
News  |  3/31/2020  | 
Security teams were not ready for the wholesale move to remote work and the sudden expansion of the attack surface area, experts say.
Does the 2020 Online Census Account for Security Risk?
News  |  3/31/2020  | 
Experts discuss the security issues surrounding a census conducted online and explain how COVID-19 could exacerbate the risk.
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Slideshows  |  3/31/2020  | 
These products and services could be of immediate help to infosec pros now protecting their organizations while working from home.
Researchers Spot Sharp Increase in Zoom-Themed Domain Registrations
News  |  3/30/2020  | 
Attackers are attempting to take advantage of the surge in teleworking prompted by COVID-19, Check Point says.
Microsoft Edge Will Tell You If Credentials Are Compromised
Quick Hits  |  3/30/2020  | 
Password Monitor, InPrivate mode, and ad-tracking prevention are three new additions to Microsoft Edge.
Insurance Giant Chubb Might Be Ransomware Victim
Quick Hits  |  3/26/2020  | 
A ransomware operator claims to have successfully attacked Chubb Insurance databases.
Missing Patches, Misconfiguration Top Technical Breach Causes
News  |  3/25/2020  | 
Less than half of businesses surveyed can patch critical vulnerabilities within 72 hours. Why does the process take so long?
Tupperware Hit by Card Skimmer Attack
Quick Hits  |  3/25/2020  | 
Malicious code was found hidden inside graphics files on the storage container maker's e-commerce website.
Do DevOps Teams Need a Company Attorney on Speed Dial?
Commentary  |  3/25/2020  | 
In today's regulatory and legislative environment, companies and individuals are exposed to lawsuits over security breaches, resulting in significant fines and ending careers.
Malware Found Hidden in Android Utility Apps, Children's Games
Quick Hits  |  3/24/2020  | 
The 'Tekya' malware, as researchers call it, is designed to imitate the user's actions to click advertisements.
How to Secure Your Kubernetes Deployments
Commentary  |  3/24/2020  | 
As more companies shift their software to a microservices-based architecture and orchestrate their containerized applications in Kubernetes, distributed security controls become a must.
538 Million Weibo Users' Info for Sale on Dark Web
Quick Hits  |  3/23/2020  | 
The user data, which does not include passwords, purportedly comes from a mid-2019 breach.
200M Records of US Citizens Leaked in Unprotected Database
News  |  3/20/2020  | 
Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.
Misconfigured Elasticsearch Instance Exposes More Than 5 Billion Records
Quick Hits  |  3/19/2020  | 
The collections contained information collected by a UK research firm on data breaches from the years 2012 to 2019.
Achieving DevSecOps Requires Cutting Through the Jargon
Commentary  |  3/19/2020  | 
Establishing a culture where security can work easily with developers starts with making sure they can at least speak the same language.
500,000 Documents Exposed in Open S3 Bucket Incident
Quick Hits  |  3/18/2020  | 
The open database exposed highly sensitive financial and business documents related to two financial organizations.
Attorney General Directs DoJ to Prioritize Coronavirus Crime
Quick Hits  |  3/17/2020  | 
Criminal activity related to the pandemic cannot be tolerated, William Barr states in memo.
Startup Offering Secure Access to Corporate Apps Emerges from Stealth
News  |  3/17/2020  | 
Axis Security has raised $17 million in VC funding.
Hellman & Friedman Acquires Checkmarx for $1.15B
Quick Hits  |  3/16/2020  | 
The private equity firm will buy Checkmarx from Insight Partners, which will continue to own a minority interest.
Fewer Vulnerabilities in Web Frameworks, but Exploits Remain Steady
News  |  3/16/2020  | 
Attackers continue to focus on web and application frameworks, such as Apache Struts and WordPress, fighting against a decline in vulnerabilities, according to an analysis.
Cyberspace Solarium Commission Slams US Cybersecurity Readiness
Quick Hits  |  3/11/2020  | 
The federal commission outlined more than 60 recommendations to remedy major security problems.
How Microsoft Disabled Legacy Authentication Across the Company
News  |  3/9/2020  | 
The process was not smooth or straightforward, employees say in a discussion of challenges and lessons learned during the multi-year project.
Malware Campaign Feeds on Coronavirus Fears
Quick Hits  |  3/9/2020  | 
A new malware campaign that offers a "coronavirus map" delivers a well-known data-stealer.
7 Cloud Attack Techniques You Should Worry About
Slideshows  |  3/6/2020  | 
Security pros detail the common and concerning ways attackers target enterprise cloud environments.
Former Acting Inspector General Charged in Federal Fraud Scheme
Quick Hits  |  3/6/2020  | 
A federal grand jury has indicted Charles K. Edwards on 16 counts related to a conspiracy to steal software from one department and sell an enhanced version to another.
3 Data Breaches Disclosed This Week: J.Crew, T-Mobile, and Carnival
Quick Hits  |  3/5/2020  | 
The separate incidents show how data theft knows no market-based limits.
CISOs Who Want a Seat at the DevOps Table Better Bring Value
Commentary  |  3/4/2020  | 
Here are four ways to make inroads with the DevOps team -- before it's too late.
Cathay Pacific Hit with Fine for Long-Lasting Breach
Quick Hits  |  3/4/2020  | 
The breach, which was active for four years, resulted in the theft of personal information on more than 9 million people.
3 Ways to Strengthen Your Cyber Defenses
Commentary  |  3/4/2020  | 
By taking proactive action, organizations can face down threats with greater agility and earned confidence.
Gotta Patch 'Em All? Not Necessarily, Experts Say
News  |  3/3/2020  | 
When it's impossible to remediate all vulnerabilities in an organization, data can indicate which bugs should be prioritized.
Avoiding the Perils of Electronic Communications
Commentary  |  3/3/2020  | 
Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That's why an agile communications strategy is so important.
Former Microsoft Software Engineer Convicted of Fraud
Quick Hits  |  3/3/2020  | 
The 25-year-old was convicted of 18 charges stemming from illegal access to money stored in online gift cards.
Walgreens' Mobile App Exposes Customers' Info
Quick Hits  |  3/2/2020  | 
An error in the app allowed some secure chat users to see medical information that wasn't theirs.
Clearview AI Customers Exposed in Data Breach
Quick Hits  |  2/27/2020  | 
Customers for the controversial facial recognition company were detailed in a log file leaked to news organizations.
Commonsense Security: Leveraging Dialogue & Collaboration for Better Decisions
Commentary  |  2/26/2020  | 
Sometimes, good old-fashioned tools can help an enterprise create a cost-effective risk management strategy.
Google Adds More Security Features Via Chronicle Division
News  |  2/25/2020  | 
Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform.
Verizon: Attacks on Mobile Devices Rise
News  |  2/25/2020  | 
Companies of all sizes are being hit by mobile attacks and feeling the effects for extended periods of time, according to the 2020 Verizon Mobile Security Index.
California Man Arrested for Politically Motivated DDoS
Quick Hits  |  2/21/2020  | 
The distributed denial-of-service attacks took a congressional candidate's website offline for a total of 21 hours during the campaign for office.
Security Now Merges With Dark Reading
News  |  2/21/2020  | 
Readers of Security Now will join the Dark Reading community, gaining access to a wide range of cybersecurity content.
Ransomware Damage Hit $11.5B in 2019
Quick Hits  |  2/20/2020  | 
A new report shows the scale of ransomware's harm and the growth of that damage year-over-year -- an average of $141,000 per incident.
Users Have Risky Security Habits, but Security Pros Aren't Much Better
News  |  2/19/2020  | 
Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.
DHS's CISA Warns of New Critical Infrastructure Ransomware Attack
Quick Hits  |  2/19/2020  | 
An attack on a natural gas compression facility sent the operations offline for two days.
DHS Warns of Cyber Heartbreak
Quick Hits  |  2/14/2020  | 
Fraudulent dating and relationship apps and websites raise the risks for those seeking online romance on Valentine's Day.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17230
PUBLISHED: 2020-04-03
includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress allows unauthenticated options changes.
CVE-2019-17231
PUBLISHED: 2020-04-03
includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress has multiple stored XSS issues.
CVE-2020-10689
PUBLISHED: 2020-04-03
A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods. An authenticated user can exploit this flaw to bypass JWT proxy and gain access to the workspace pods of another user. Successful exploitation requires knowledge of the service name ...
CVE-2020-10960
PUBLISHED: 2020-04-03
In MediaWiki before 1.34.1, users can add various Cascading Style Sheets (CSS) classes (which can affect what content is shown or hidden in the user interface) to arbitrary DOM nodes via HTML content within a MediaWiki page. This occurs because jquery.makeCollapsible allows applying an event handler...
CVE-2020-11500
PUBLISHED: 2020-04-03
Zoom Client for Meetings through 4.6.9 uses the ECB mode of AES for video and audio encryption. Within a meeting, all participants use a single 128-bit key.