Insider Sabotage among Top 3 Threats CISOs Cant yet Handle
Luana Pascu, Security Specialist, Bitdefender
These five steps can help your organizations limit the risks from disgruntled employees and user errors.
By Luana Pascu Security Specialist, Bitdefender, 3/1/2017
Comment0 comments  |  Read  |  Post a Comment
Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
A recent Bitdefender survey of 250 US IT execs in companies with 1000 or more PCs paints a disturbing picture of cybersecurity preparedness in the enterprise.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/28/2017
Comment3 comments  |  Read  |  Post a Comment
How to Secure Hyperconverged Infrastructures & Why It Is Different
Liviu Arsene, Senior E-threat Analyst, Bitdefender
The next-generation datacenter requires new security practices, but that doesnt mean everything we learned about datacenter security becomes obsolete.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/23/2017
Comment0 comments  |  Read  |  Post a Comment
Survey: 14% Of IT Execs Would Pay $500K To Avoid Shaming After A Breach
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Bitdefender report shows how negative media headlines following an attack can cause financial damage, ruin business forecasts and severely damage reputations.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/22/2017
Comment0 comments  |  Read  |  Post a Comment
Do Software-Defined Data Centers Pose Security Concerns?
Liviu Arsene, Senior E-threat Analyst, Bitdefender
SDDC adoption is likely to trigger widespread data security governance programs, with 20 percent of organizations considering them necessary to prevent data breaches.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/20/2017
Comment0 comments  |  Read  |  Post a Comment
Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Three main threats companies arent prepared to handle include outside attacks, data vulnerability and insider sabotage.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 1/31/2017
Comment1 Comment  |  Read  |  Post a Comment
Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
Liviu Arsene, Senior E-threat Analyst, Bitdefender
When protecting physical or virtual endpoints, its vital to have more than one layer of defense against malware.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/23/2017
Comment0 comments  |  Read  |  Post a Comment
What to Consider When Moving To Hyperconverged Infrastructure
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/19/2017
Comment0 comments  |  Read  |  Post a Comment
Machine Learning For Cybersecurity Not Cybercrime
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Cybercriminals have yet to adopt machine learning for offensive attack strategies - and they probably wont for a long time.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/17/2017
Comment1 Comment  |  Read  |  Post a Comment
How Machine Learning For Behavior Analytics & Anomaly Detection Speeds Mitigation
Liviu Arsene, Senior E-threat Analyst, Bitdefender
By relying on artificial intelligence to identify suspicious network activity or behavior, machine learning can adapt to both business needs and new threats.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/9/2017
Comment0 comments  |  Read  |  Post a Comment
2017 To Bring More Ransomware, IoT DDoS Attacks, And SCADA Incidents
Luana Pascu, Security Specialist, Bitdefender
As hackers begin to target corporations in an attempt to extort higher ransom fees, the threat will only become more serious.
By Luana Pascu Security Specialist, Bitdefender, 1/5/2017
Comment0 comments  |  Read  |  Post a Comment
Machine-Learning Algorithms Improve Detection Time For Modern Threats
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Artificial intelligence and machine learning are essential to combat a threat landscape that is larger and more sophisticated than ever.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 12/12/2016
Comment0 comments  |  Read  |  Post a Comment
Avalanche Cybercrime Platform Takedown Leaves A Lot To Clean Up
Bogdan Botezatu, Senior E-threat Analyst, Bitdefender
Help us wipe out the remaining bots and put an end to Avalanche once and for all.
By Bogdan Botezatu Senior E-threat Analyst, Bitdefender, 12/5/2016
Comment1 Comment  |  Read  |  Post a Comment
Job Loss And Financial Damage: CIOs Main Fears When Adopting Virtualization
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Companies arent prepared for the security challenges of hybrid infrastructures, Bitdefender study reveals.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 11/30/2016
Comment0 comments  |  Read  |  Post a Comment
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13101
PUBLISHED: 2018-08-15
Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.