Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Perimeter posted in October 2014
Financial Breaches Show Trust Model Is Broken
Commentary  |  10/31/2014  | 
Its a full-blown crisis when a dozen major financial services firms admit to having their networks probed by the same attackers as those behind the JPMorgan Chase breach.
Welcome To My Cyber Security Nightmare
Commentary  |  10/30/2014  | 
Happy Halloween. Here are three chilling scenarios that will keep even the most hardened infosec warrior awake all night.
Keep Calm & Verify: How To Spot A Fake Online Data Dump
News  |  10/29/2014  | 
Determining whether a data dump on Pastebin or elsewhere online is legit can be time-consuming and resource-intensive. Deloitte & Touche offers tips for how to weed out the fake hacks.
Infographic: The Many Faces of Todays Hackers
Commentary  |  10/29/2014  | 
How many of these hacker personas are you dueling with in your organization?
A Simple Formula For Usable Risk Intelligence
Commentary  |  10/27/2014  | 
How infosec can cut through the noise and gain real value from cyberdata.
Poll: Patching Is Primary Response to Shellshock
Commentary  |  10/24/2014  | 
As potential threats mount, Dark Reading community members home in on patching infrastructure but not devices, according to our latest poll.
Incident Response: Is Your IR Plan A Glorified Phone Tree?
Commentary  |  10/23/2014  | 
Training internal security teams to be first responders can drastically improve an organization's effectiveness in the wake of a data breach. Here's why.
The Internet of Things: 7 Scary Security Scenarios
Slideshows  |  10/16/2014  | 
The IoT can be frightening when viewed from the vantage point of information security.
Third-Party Code: Fertile Ground For Malware
Commentary  |  10/15/2014  | 
How big-brand corporate websites are becoming a popular method for mass distribution of exploit kits on vulnerable computers.
Stolen Medical Data Is Now A Hot Commodity
Commentary  |  10/14/2014  | 
While credit cards are selling for a dollar or less on the black market, personal health credentials are commanding as much as $10 per patient. Heres why.
How To Be A 'Compromise-Ready' Organization
News  |  10/9/2014  | 
Incident response pros share tips on how to have all your ducks in a row before the inevitable breach.
How Retail Can Win Back Consumer Trust
Commentary  |  10/9/2014  | 
Customer loyalty to their favorite brands is all about trust, which today has everything to do with security and privacy.
Hackers Steal Millions In Cash From ATMs, Using Tyupkin Malware
Quick Hits  |  10/7/2014  | 
Attackers add in failsafes to prevent innocents from triggering attack and money mules from going rogue.
Tokenization: 6 Reasons The Card Industry Should Be Wary
Commentary  |  10/7/2014  | 
VISAs new token service aims to provide consumers a simple, fraud-free digital payment experience. Its a worthy goal, but one that may prove to be more aspirational than functional.
Apple Makes Move To Shut Down Mac Botnet
News  |  10/6/2014  | 
Cupertino engineers move swiftly to contain a Trojan outbreak reportedly propagated through pirated software.
How Cookie-Cutter Cyber Insurance Falls Short
Commentary  |  10/6/2014  | 
Many off-the-shelf cyber liability policies feature a broad range of exclusions that wont protect your company from a data breach or ransomware attack.
To Combat Government Snooping, Encrypt Data Before Putting It In Cloud, Says Interop Speaker
Quick Hits  |  10/3/2014  | 
If Uncle Sam wants your data, make him come directly to you.
How Retro Malware Feeds the New Threat Wave
Commentary  |  10/3/2014  | 
Old-school exploits used in new ways are placing fresh demands for intel-sharing among infosec pros and their time-tested and next-gen security products.
Cyberinsurance Resurges In The Wake Of Mega-Breaches
News  |  10/2/2014  | 
Insurance policies customized for cyberattack protection are on the rise as businesses worry they could be the next Target.
Poll: Employees Clueless About Social Engineering
Commentary  |  10/2/2014  | 
Not surprisingly, our latest poll confirms that threats stemming from criminals hacking humans are all too frequently ignored.
Smart Meter Hack Shuts Off The Lights
News  |  10/1/2014  | 
European researchers will reveal major security weaknesses in smart meters that could allow an attacker to order a power blackout.
5 New Truths To Teach Your CIO About Identity
Commentary  |  10/1/2014  | 
When CIOs talk security they often use words like "firewall" and "antivirus." Heres why todays technology landscape needs a different vocabulary.


Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23901
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
CVE-2020-17532
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd