Insider Sabotage among Top 3 Threats CISOs Cant yet Handle
Luana Pascu, Security Specialist, Bitdefender
These five steps can help your organizations limit the risks from disgruntled employees and user errors.
By Luana Pascu Security Specialist, Bitdefender, 3/1/2017
Comment0 comments  |  Read  |  Post a Comment
Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
A recent Bitdefender survey of 250 US IT execs in companies with 1000 or more PCs paints a disturbing picture of cybersecurity preparedness in the enterprise.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/28/2017
Comment3 comments  |  Read  |  Post a Comment
How to Secure Hyperconverged Infrastructures & Why It Is Different
Liviu Arsene, Senior E-threat Analyst, Bitdefender
The next-generation datacenter requires new security practices, but that doesnt mean everything we learned about datacenter security becomes obsolete.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/23/2017
Comment0 comments  |  Read  |  Post a Comment
Survey: 14% Of IT Execs Would Pay $500K To Avoid Shaming After A Breach
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Bitdefender report shows how negative media headlines following an attack can cause financial damage, ruin business forecasts and severely damage reputations.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/22/2017
Comment0 comments  |  Read  |  Post a Comment
Do Software-Defined Data Centers Pose Security Concerns?
Liviu Arsene, Senior E-threat Analyst, Bitdefender
SDDC adoption is likely to trigger widespread data security governance programs, with 20 percent of organizations considering them necessary to prevent data breaches.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/20/2017
Comment0 comments  |  Read  |  Post a Comment
Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Three main threats companies arent prepared to handle include outside attacks, data vulnerability and insider sabotage.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 1/31/2017
Comment1 Comment  |  Read  |  Post a Comment
Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
Liviu Arsene, Senior E-threat Analyst, Bitdefender
When protecting physical or virtual endpoints, its vital to have more than one layer of defense against malware.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/23/2017
Comment0 comments  |  Read  |  Post a Comment
What to Consider When Moving To Hyperconverged Infrastructure
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/19/2017
Comment0 comments  |  Read  |  Post a Comment
Machine Learning For Cybersecurity Not Cybercrime
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Cybercriminals have yet to adopt machine learning for offensive attack strategies - and they probably wont for a long time.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/17/2017
Comment1 Comment  |  Read  |  Post a Comment
How Machine Learning For Behavior Analytics & Anomaly Detection Speeds Mitigation
Liviu Arsene, Senior E-threat Analyst, Bitdefender
By relying on artificial intelligence to identify suspicious network activity or behavior, machine learning can adapt to both business needs and new threats.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/9/2017
Comment0 comments  |  Read  |  Post a Comment
2017 To Bring More Ransomware, IoT DDoS Attacks, And SCADA Incidents
Luana Pascu, Security Specialist, Bitdefender
As hackers begin to target corporations in an attempt to extort higher ransom fees, the threat will only become more serious.
By Luana Pascu Security Specialist, Bitdefender, 1/5/2017
Comment0 comments  |  Read  |  Post a Comment
Machine-Learning Algorithms Improve Detection Time For Modern Threats
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Artificial intelligence and machine learning are essential to combat a threat landscape that is larger and more sophisticated than ever.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 12/12/2016
Comment0 comments  |  Read  |  Post a Comment
Avalanche Cybercrime Platform Takedown Leaves A Lot To Clean Up
Bogdan Botezatu, Senior E-threat Analyst, Bitdefender
Help us wipe out the remaining bots and put an end to Avalanche once and for all.
By Bogdan Botezatu Senior E-threat Analyst, Bitdefender, 12/5/2016
Comment1 Comment  |  Read  |  Post a Comment
Job Loss And Financial Damage: CIOs Main Fears When Adopting Virtualization
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Companies arent prepared for the security challenges of hybrid infrastructures, Bitdefender study reveals.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 11/30/2016
Comment0 comments  |  Read  |  Post a Comment
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.