Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Careers & People posted in February 2016
CISO Still Viewed As Tech Not Business Leader
News  |  2/29/2016  | 
RSAC/ISACA study shows only one in seven CISOs report to CEO.
The ROI Of Infosec: 11 Dos and Donts For Management Buy In
Commentary  |  2/27/2016  | 
The case for a bigger bottom line depends on how well you argue that the business cant run without a specific level of security infrastructure.
So You Want to Be a Security Researcher?
News  |  2/26/2016  | 
Security researchers need a broad set of skills to investigate a constantly-changing threat landscape. But specializing in areas such as reverse engineering or network forensics will boost opportunities.
Security Lessons From My Doctor
Commentary  |  2/25/2016  | 
Why its hard to change risky habits like weak passwords and heavy smoking, even when advice is clear.
The Week In Justice: 3 Confessions, 2 Convictions & 2 Years For Two Hackers
News  |  2/24/2016  | 
Courts obtain convictions and guilty pleas from those involved with 'largest known' hacking and securities fraud scheme, online hacking forums, celebrity photo theft, and malicious insider destructive attacks.
Public Vs. Private: Is A Prestigious Infosec College Degree Worth It?
Commentary  |  2/24/2016  | 
Today's graduates coming into the information security industry from private universities arent ready for the workforce.
Hospital Hacktivist Arrested In Miami After Failed Escape Attempt
Quick Hits  |  2/18/2016  | 
Boston Children's Hospital hacker's flee to Cuba foiled by troubles with getaway boat.
Security Lessons From My Car Mechanic
Commentary  |  2/18/2016  | 
What an unlocked oil pan taught me about me about the power of two-way communication between security pros and the organizations they serve.
A Not-So-Secret Secret About Cybercrime
Commentary  |  2/16/2016  | 
Cybersecurity is an issue business leaders fret a lot about in public, but they rarely treat the problem as a real and immediate threat.
How To Retain Good Security People: Keep The Work Exciting
News  |  2/15/2016  | 
Security managers should foster a challenging but rewarding work environment and invest in training to keep their security teams intact.
Perceptions Of IT Risk Changing In Business Ranks
News  |  2/12/2016  | 
Business leaders increasingly see IT risk as huge, but policy making and visibility still lag.
The Phishie Awards: (Dis)Honoring The Best Of The Worst Phishing Attacks
Slideshows  |  2/10/2016  | 
From the costly to the clever to the just plain creepy, here are the recent phishing campaigns that have earned our reluctant recognition.
Is The Cybersecurity Bubble About To Burst?
News  |  2/10/2016  | 
Cybersecurity stocks are way down in 2016 so far, but venture capital money still flows.
Monday Morning Quarterbacking Super Bowl 50: Infosec Edition
Commentary  |  2/8/2016  | 
How to coach your team to victory in the battle to protect corporate data and intellectual property. After all, theres a lot riding on your game, too.
New Kid On The Block: Cyber Threat Analyst
Commentary  |  2/4/2016  | 
Drawing from the financial service industry, this new role uses the art of the intelligence cycle to drive efficiency in the security operations center.
EU, US Agree On New Data Transfer Pact, But Will It Hold?
News  |  2/2/2016  | 
So long Safe Harbor, hello 'Privacy Shield.'
The Cybersecurity Talent You Seek May Be In-House
News  |  2/1/2016  | 
IT staff in many cases are already performing security-related work -- with proper training, they could be converted to the security team.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...