Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Cloud posted in January 2018
Google Cloud Least-Privilege Function Goes Live
Quick Hits  |  1/31/2018  | 
Custom Roles for Cloud IAM now available in production from Google.
Breach-Proofing Your Data in a GDPR World
Commentary  |  1/30/2018  | 
Here are six key measures for enterprises to prioritize over the next few months.
Endpoint and Mobile Top Security Spending at 57% of Businesses
Quick Hits  |  1/26/2018  | 
Businesses say data-at-rest security tools are most effective at preventing breaches, but spend most of their budgets securing endpoint and mobile devices.
Selling Cloud-Based Cybersecurity to a Skeptic
Partner Perspectives  |  1/26/2018  | 
When it comes to security, organizations don’t need to look at cloud as an either/or proposition. But there are misconceptions that need to be addressed.
How Containers & Serverless Computing Transform Attacker Methodologies
Commentary  |  1/25/2018  | 
The pace of hacker innovation never slows. Now security technologies and methods must adapt with equal urgency.
Meet Chronicle: Alphabet's New Cybersecurity Business
News  |  1/24/2018  | 
Google parent company Alphabet introduces Chronicle, which will combine a security analytics platform and VirusTotal.
Financial Impact of Cloud Failure Could Hit $2.8B in Insured Loss
News  |  1/24/2018  | 
A new report highlights the potential financial damage of downtime at top cloud services providers.
GDPR: Ready or Not, Here It Comes
Commentary  |  1/24/2018  | 
As organizations all over the world look ahead to May 25 when Europe's General Data Protection Regulation takes effect, many will fall short.
10 Costs Your Cyber Insurance Policy May Not Cover
Slideshows  |  1/23/2018  | 
All the things you might think are covered but that don't actually fall under most policies.
Fallout from Rushed Patching for Meltdown, Spectre
News  |  1/23/2018  | 
Not all systems require full patching for the flaws right now, anyway, experts say.
Less than 10% of Gmail Users Employ Two-Factor Authentication
Quick Hits  |  1/23/2018  | 
Google software engineer reveals lack of user adoption for stronger authentication.
45% of Businesses Say Employees Are Biggest Security Risk
Quick Hits  |  1/23/2018  | 
The most common cloud security worries remain the same, with unauthorized access and malware infiltrations topping concerns.
5 Steps to Better Security in Hybrid Clouds
Commentary  |  1/23/2018  | 
Following these tips can improve your security visibility and standardize management across hybrid environments.
Intel Says to Stop Applying Problematic Spectre, Meltdown Patch
News  |  1/22/2018  | 
Cause of reboot problems with its Broadwell and Haswell microprocessor patching now identified, the chipmaker said.
Most Companies Suffer Reputation Damage After Security Incidents
Quick Hits  |  1/22/2018  | 
New Kroll Annual Global Fraud & Risk Report says 86% of companies worldwide experienced security incidents and information theft and loss in the past twelve months.
Facebook Launches 'Secure the Internet Grants' Program
Quick Hits  |  1/22/2018  | 
The new initiative encourages universities, non-profits, and NGOs to submit applied research proposals for new security defense technologies that can be used in practice.
Understanding Supply Chain Cyber Attacks
Commentary  |  1/19/2018  | 
While the attack surface has increased exponentially because of the cloud and everything-as-a-service providers, there are still ways in which host companies can harden supply chain security.
Tax Reform, Cybersecurity-Style
Commentary  |  1/18/2018  | 
How the security industry can be more effective and efficient by recognizing four hidden "taxes" in the buying and selling process.
The Startup Challenge: Safe in the Cloud from Day One
Partner Perspectives  |  1/18/2018  | 
How a Seattle travel company built a rock-solid mobile app without sacrificing performance or security.
WatchGuard Buys DNS-Filtering Company Percipient Networks
Quick Hits  |  1/17/2018  | 
Percipient's 'Strongarm' to become part of WatchGuard's SMB security services.
Where to Find Security Holes in Serverless Architecture
News  |  1/17/2018  | 
Serverless architectures take away business responsibility for server management, but security should still be top of mind.
Google Rolls Out Security Center for G Suite Enterprise
News  |  1/17/2018  | 
New dashboards give admins a look at data such as suspicious device activity and spam email delivery across the business.
1 in 9 Online Accounts Created in 2017 Was Fraudulent
Quick Hits  |  1/16/2018  | 
Account takeovers hot, stolen credit cards not.
Responding to the Rise of Fileless Attacks
News  |  1/11/2018  | 
Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise targets.
Privacy: The Dark Side of the Internet of Things
Commentary  |  1/11/2018  | 
Before letting an IoT device into your business or home, consider what data is being collected and where it is going.
AWS, Google Cloud Popular Home for Botnet Controllers
News  |  1/10/2018  | 
The number of command-and-control listings increase 32% in 2017, with more botnet controllers hosted in the cloud.
'Tis the Season: Dark Reading Caption Contest Winners
Commentary  |  1/9/2018  | 
Bricked devices, penetration tests, and virtual reality were among the themes submitted in our latest holiday caption competition. And the winners are ...
Microsoft Confirms Windows Performance Hits with Meltdown, Spectre Patches
News  |  1/9/2018  | 
Windows servers will see biggest degradation, as will Windows 7 and 8 client machines, Microsoft said.
Meltdown, Spectre Likely Just Scratch the Surface of Microprocessor Vulnerabilities
News  |  1/8/2018  | 
There's a lot at stake when it comes to patching the hardware flaws.
Cyxtera Technologies to Acquire Immunity
Quick Hits  |  1/8/2018  | 
Deal will bring penetration testing products and services to Cyxtera's threat analytics portfolio.
Google Apps Script Vulnerability Exposes SaaS to URL-based Threats
News  |  1/4/2018  | 
A new means of exploiting Google Apps Script lets attackers deliver malware using URLs.
Critical Microprocessor Flaws Affect Nearly Every Machine
News  |  1/3/2018  | 
Researchers release details of 'Meltdown' and 'Spectre' attacks that allow programs to steal sensitive data.
Barracuda Hooks PhishLine in Social Engineering Security Acquisition
Quick Hits  |  1/3/2018  | 
Barracuda plans to use PhishLine's user awareness training to protect against targeted email-based attacks.
A Pragmatic Approach to Fixing Cybersecurity: 5 Steps
Commentary  |  1/3/2018  | 
The digital infrastructure that supports our economy, protects our national security, and empowers our society must be made more secure, more trusted, and more reliable. Here's how.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file