Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Identity & Access Management posted in June 2016
Hackers Pilfer $10 Million From Ukraine Bank
Quick Hits  |  6/29/2016  | 
Reports allege criminals used SWIFT to transfer money, have compromised several Ukraine, Russia banks.
Cisco Boosts Cloud Security Capabilities With CloudLock Buy
News  |  6/28/2016  | 
Network giant will purchase the Massachusetts-based provider of cloud access security broker technology for $293 million.
Google Accounts Of US Military, Journalists Targeted By Russian Attack Group
News  |  6/27/2016  | 
The Threat Group 4127 that hit the Democratic National Committee also went after 1,800 other targets with info interesting to Russian government, says SecureWorks.
The Blind Spot Between The Cloud & The Data Center
Commentary  |  6/27/2016  | 
Ask most enterprise security analysts responsible for detection and response about their visibility into identity access risks and youre likely to get some confused looks. Heres why.
Phishing, Whaling & The Surprising Importance Of Privileged Users
Commentary  |  6/21/2016  | 
By bagging a privileged user early on, attackers can move from entry point to mission accomplished in no time at all.
5 Tips For Staying Cyber-Secure On Your Summer Vacation
News  |  6/20/2016  | 
Stick with mobile payment apps and carrier networks when traveling. And don't broadcast your plans or locations via social media.
Pretty Good Passwords: Cartoon Caption Contest Winners
Commentary  |  6/16/2016  | 
Sticky notes, multi-factor authentication, password reuse and Donald Trump. And the winner is...
Twitter Says Its Servers Were Not Breached
Quick Hits  |  6/13/2016  | 
Account details leaked are from other hacked websites, claims the social media tool.
How To Prepare For A Data Breach
Slideshows  |  6/7/2016  | 
These five from-the-trenches strategies will help you win the fight against today's sophisticated, conniving attackers.
Microsegmentation & The Need For An Intelligent Attack Surface
Commentary  |  6/7/2016  | 
There is a fundamental difference in the security posture and technology for protecting the White House versus a Social Security office in California. So, too, for the critical apps and systems that are likely targets in your enterprise.
How Risky Is Bleeding Edge Tech?
Slideshows  |  6/5/2016  | 
Experts with the Carnegie Mellon University Software Engineering Institute rate 10 up-and-coming technologies for risk.
Connected Cars: 6 Tips For Riding Safely With Onboard Devices
Slideshows  |  6/3/2016  | 
Carnegie Mellon researchers note that the cheaper the after market device, the easier it can be hacked.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7700
PUBLISHED: 2020-08-14
All versions of phpjs are vulnerable to Prototype Pollution via parse_str.
CVE-2020-7701
PUBLISHED: 2020-08-14
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
CVE-2020-9228
PUBLISHED: 2020-08-14
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information.
CVE-2020-9229
PUBLISHED: 2020-08-14
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information.
CVE-2019-19643
PUBLISHED: 2020-08-14
ise smart connect KNX Vaillant 1.2.839 contain a Denial of Service.