Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Careers & People posted in February 2016
CISO Still Viewed As Tech Not Business Leader
News  |  2/29/2016  | 
RSAC/ISACA study shows only one in seven CISOs report to CEO.
The ROI Of Infosec: 11 Dos and Don’ts For Management Buy In
Commentary  |  2/27/2016  | 
The case for a bigger bottom line depends on how well you argue that the business can’t run without a specific level of security infrastructure.
So You Want to Be a Security Researcher?
News  |  2/26/2016  | 
Security researchers need a broad set of skills to investigate a constantly-changing threat landscape. But specializing in areas such as reverse engineering or network forensics will boost opportunities.
Security Lessons From My Doctor
Commentary  |  2/25/2016  | 
Why it’s hard to change risky habits like weak passwords and heavy smoking, even when advice is clear.
The Week In Justice: 3 Confessions, 2 Convictions & 2 Years For Two Hackers
News  |  2/24/2016  | 
Courts obtain convictions and guilty pleas from those involved with 'largest known' hacking and securities fraud scheme, online hacking forums, celebrity photo theft, and malicious insider destructive attacks.
Public Vs. Private: Is A Prestigious Infosec College Degree Worth It?
Commentary  |  2/24/2016  | 
Today's graduates coming into the information security industry from private universities aren’t ready for the workforce.
Hospital Hacktivist Arrested In Miami After Failed Escape Attempt
Quick Hits  |  2/18/2016  | 
Boston Children's Hospital hacker's flee to Cuba foiled by troubles with getaway boat.
Security Lessons From My Car Mechanic
Commentary  |  2/18/2016  | 
What an unlocked oil pan taught me about me about the power of two-way communication between security pros and the organizations they serve.
A Not-So-Secret Secret About Cybercrime
Commentary  |  2/16/2016  | 
Cybersecurity is an issue business leaders fret a lot about in public, but they rarely treat the problem as a real and immediate threat.
How To Retain Good Security People: Keep The Work Exciting
News  |  2/15/2016  | 
Security managers should foster a challenging but rewarding work environment and invest in training to keep their security teams intact.
Perceptions Of IT Risk Changing In Business Ranks
News  |  2/12/2016  | 
Business leaders increasingly see IT risk as huge, but policy making and visibility still lag.
The Phishie Awards: (Dis)Honoring The Best Of The Worst Phishing Attacks
Slideshows  |  2/10/2016  | 
From the costly to the clever to the just plain creepy, here are the recent phishing campaigns that have earned our reluctant recognition.
Is The Cybersecurity Bubble About To Burst?
News  |  2/10/2016  | 
Cybersecurity stocks are way down in 2016 so far, but venture capital money still flows.
Monday Morning Quarterbacking Super Bowl 50: Infosec Edition
Commentary  |  2/8/2016  | 
How to coach your team to victory in the battle to protect corporate data and intellectual property. After all, there’s a lot riding on your game, too.
New Kid On The Block: Cyber Threat Analyst
Commentary  |  2/4/2016  | 
Drawing from the financial service industry, this new role uses the “art of the intelligence cycle” to drive efficiency in the security operations center.
EU, US Agree On New Data Transfer Pact, But Will It Hold?
News  |  2/2/2016  | 
So long Safe Harbor, hello 'Privacy Shield.'
The Cybersecurity Talent You Seek May Be In-House
News  |  2/1/2016  | 
IT staff in many cases are already performing security-related work -- with proper training, they could be converted to the security team.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file