Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Commentary

Content posted in June 2016
The Newbies 'How To Survive Black Hat' Guide
Commentary  |  6/29/2016  | 
Theres little chance you wont be totally exhausted after drinking from the information firehose all week. But if you follow these eight steps, it will be a very satisfying kind of fatigue.
Microsoft + LinkedIn: How To Spot Insider Trading Risk Early
Commentary  |  6/28/2016  | 
With the explosion of mobile, cloud, and the blurring of work and personal data, companies considering M&A have a lot to worry about when it comes to insider threats.
The Blind Spot Between The Cloud & The Data Center
Commentary  |  6/27/2016  | 
Ask most enterprise security analysts responsible for detection and response about their visibility into identity access risks and youre likely to get some confused looks. Heres why.
Mind The Gap: CISOs Versus 'Operators'
Commentary  |  6/25/2016  | 
How open communication among security execs and analysts, incidents responders, and engineers can help organizations stay on top of the constantly changing threat landscape.
Security Lessons from My Financial Planner
Commentary  |  6/24/2016  | 
Security investments can be viewed as a portfolio. If we think in portfolio terms, we realize that ROI is a backwards-looking measure. What else can we learn from financial planners?
Internet Of Things & The Platform Of Parenthood
Commentary  |  6/23/2016  | 
A new fathers musings on the problems with securing embedded systems, and why there are so few incentives for architecting trustworthy IoT technology from the ground up.
Bug Poachers: A New Breed of Cybercriminal
Commentary  |  6/22/2016  | 
As if security researchers don't have enough to worry about, we now have to contend with extortionists who take advantage of the well-established fact that applications are a ripe target for exploitation.
Phishing, Whaling & The Surprising Importance Of Privileged Users
Commentary  |  6/21/2016  | 
By bagging a privileged user early on, attackers can move from entry point to mission accomplished in no time at all.
Privacy Shield: Can the US Earn the EUs Trust Post Apple vs. FBI?
Commentary  |  6/20/2016  | 
Rebuilding the privacy framework for data transfer between the US and its European trading partners wont be easy but its still a worthwhile effort.
The Gamble Behind Cyber Threat Intelligence Sharing
Commentary  |  6/18/2016  | 
In theory, sharing threat intel makes sense. But in cybersecurity you're not dealing with known individuals, youre dealing with anonymous adversaries capable of rapid change.
How Secure is Secure? Tips For Investing In The Right Strategy
Commentary  |  6/17/2016  | 
Business alignment, defense-in-depth and a phased approach are three principles to follow when building out a solid security program.
Pretty Good Passwords: Cartoon Caption Contest Winners
Commentary  |  6/16/2016  | 
Sticky notes, multi-factor authentication, password reuse and Donald Trump. And the winner is...
What CISOs Need to Tell The Board About Cyber Risk
Commentary  |  6/15/2016  | 
To avoid devastating financial losses, boards and the C-suite must have a deep understating of the cyber risks their organizations face. Heres what they need to hear from the security team
A Look Back At Dark Reading's Best 10 Years (So Far)
Commentary  |  6/14/2016  | 
The past decade in security -- from botnets that were bigger than some service provider networks to vulnerabilities that affected not only whole industries but the very fabric of the internet. And much, much more...
5 Soft Skills Young Cybersecurity Professionals Need to Get Ahead
Commentary  |  6/14/2016  | 
Todays employers arent looking for recruits who can maintain firewalls and mitigate risk. They want well-rounded professionals who can apply security expertise across the business to yield bottom-line results.
Self-Service Password Reset & Social Engineering: A Match Made In Hell
Commentary  |  6/13/2016  | 
A sad tale of how hackers compromised a CEOs corporate account by trolling Facebook and LInkedin for answers to six common authentication questions. (And how to avoid that happening to you)
IoT Security: Onus On Developers, Security Researchers
Commentary  |  6/11/2016  | 
Security teams and DevOps need to team up on 'lean security' processes that make safety a top priority before a product reaches the market.
Revealing Lessons About Vulnerability Research
Commentary  |  6/10/2016  | 
Its not clear why a dozen FBI agents showed up at a security researchers door last month but as cyber becomes more a factor in product safety, our judicial system needs to get a better grasp on who the real criminals are.
The End Of A Security Decade -- And The Beginning Of A New One
Commentary  |  6/10/2016  | 
Dark Reading wraps up its 10th anniversary coverage with a final look back at the decade -- and a look ahead.
Google Dorking: Exposing The Hidden Threat
Commentary  |  6/9/2016  | 
Google Dorking sounds harmless, but it can take your company down. Here's what you need to know to avoid being hacked.
Deconstructing The Impact Of Ransomware On Healthcares IoT
Commentary  |  6/8/2016  | 
If ransomware targets medical devices, exactly how will an attacker deliver the ransom note to the victim?
Microsegmentation & The Need For An Intelligent Attack Surface
Commentary  |  6/7/2016  | 
There is a fundamental difference in the security posture and technology for protecting the White House versus a Social Security office in California. So, too, for the critical apps and systems that are likely targets in your enterprise.
BYOD Security: How To Shift Device Control & Grant Users More Choice
Commentary  |  6/3/2016  | 
Gartners managed diversity model offers an ITIL-compliant information security solution to the problem of Shadow IT.
How Facebook Raises A Generation Of Intelligence Analysts
Commentary  |  6/2/2016  | 
In the process of creating and administering groups, users learn how to read data points, create a risk profile in their head, and watch for changes over time.
How Agile Changed Security At Dun & Bradstreet
Commentary  |  6/1/2016  | 
Chief Security Officer Jon Rose shares the whys and wherefores of integrating agile software development methodology into a traditional security environment.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-39229
PUBLISHED: 2021-09-20
Apprise is an open source library which allows you to send a notification to almost all of the most popular notification services available. In affected versions users who use Apprise granting them access to the IFTTT plugin (which just comes out of the box) are subject to a denial of service attack...
CVE-2021-41083
PUBLISHED: 2021-09-20
Dada Mail is a web-based e-mail list management system. In affected versions a bad actor could give someone a carefully crafted web page via email, SMS, etc, that - when visited, allows them control of the list control panel as if the bad actor was logged in themselves. This includes changing any ma...
CVE-2021-34650
PUBLISHED: 2021-09-20
The eID Easy WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the error parameter found in the ~/admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.6.
CVE-2021-41082
PUBLISHED: 2021-09-20
Discourse is a platform for community discussion. In affected versions any private message that includes a group had its title and participating user exposed to users that do not have access to the private messages. However, access control for the private messages was not compromised as users were n...
CVE-2020-16630
PUBLISHED: 2021-09-20
TI’s BLE stack caches and reuses the LTK’s property for a bonded mobile. A LTK can be an unauthenticated-and-no-MITM-protection key created by Just Works or an authenticated-and-MITM-protection key created by Passkey Entry, Numeric Comparison or OOB. Assume that...