Insider Sabotage among Top 3 Threats CISOs Cant yet Handle
Luana Pascu, Security Specialist, Bitdefender
These five steps can help your organizations limit the risks from disgruntled employees and user errors.
By Luana Pascu Security Specialist, Bitdefender, 3/1/2017
Comment0 comments  |  Read  |  Post a Comment
Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
A recent Bitdefender survey of 250 US IT execs in companies with 1000 or more PCs paints a disturbing picture of cybersecurity preparedness in the enterprise.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/28/2017
Comment3 comments  |  Read  |  Post a Comment
How to Secure Hyperconverged Infrastructures & Why It Is Different
Liviu Arsene, Senior E-threat Analyst, Bitdefender
The next-generation datacenter requires new security practices, but that doesnt mean everything we learned about datacenter security becomes obsolete.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/23/2017
Comment0 comments  |  Read  |  Post a Comment
Survey: 14% Of IT Execs Would Pay $500K To Avoid Shaming After A Breach
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Bitdefender report shows how negative media headlines following an attack can cause financial damage, ruin business forecasts and severely damage reputations.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 2/22/2017
Comment0 comments  |  Read  |  Post a Comment
Do Software-Defined Data Centers Pose Security Concerns?
Liviu Arsene, Senior E-threat Analyst, Bitdefender
SDDC adoption is likely to trigger widespread data security governance programs, with 20 percent of organizations considering them necessary to prevent data breaches.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 2/20/2017
Comment0 comments  |  Read  |  Post a Comment
Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Three main threats companies arent prepared to handle include outside attacks, data vulnerability and insider sabotage.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 1/31/2017
Comment1 Comment  |  Read  |  Post a Comment
Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
Liviu Arsene, Senior E-threat Analyst, Bitdefender
When protecting physical or virtual endpoints, its vital to have more than one layer of defense against malware.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/23/2017
Comment0 comments  |  Read  |  Post a Comment
What to Consider When Moving To Hyperconverged Infrastructure
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/19/2017
Comment0 comments  |  Read  |  Post a Comment
Machine Learning For Cybersecurity Not Cybercrime
Liviu Arsene, Senior E-threat Analyst, Bitdefender
Cybercriminals have yet to adopt machine learning for offensive attack strategies - and they probably wont for a long time.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/17/2017
Comment1 Comment  |  Read  |  Post a Comment
How Machine Learning For Behavior Analytics & Anomaly Detection Speeds Mitigation
Liviu Arsene, Senior E-threat Analyst, Bitdefender
By relying on artificial intelligence to identify suspicious network activity or behavior, machine learning can adapt to both business needs and new threats.
By Liviu Arsene Senior E-threat Analyst, Bitdefender, 1/9/2017
Comment0 comments  |  Read  |  Post a Comment
2017 To Bring More Ransomware, IoT DDoS Attacks, And SCADA Incidents
Luana Pascu, Security Specialist, Bitdefender
As hackers begin to target corporations in an attempt to extort higher ransom fees, the threat will only become more serious.
By Luana Pascu Security Specialist, Bitdefender, 1/5/2017
Comment0 comments  |  Read  |  Post a Comment
Machine-Learning Algorithms Improve Detection Time For Modern Threats
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Artificial intelligence and machine learning are essential to combat a threat landscape that is larger and more sophisticated than ever.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 12/12/2016
Comment0 comments  |  Read  |  Post a Comment
Avalanche Cybercrime Platform Takedown Leaves A Lot To Clean Up
Bogdan Botezatu, Senior E-threat Analyst, Bitdefender
Help us wipe out the remaining bots and put an end to Avalanche once and for all.
By Bogdan Botezatu Senior E-threat Analyst, Bitdefender, 12/5/2016
Comment1 Comment  |  Read  |  Post a Comment
Job Loss And Financial Damage: CIOs Main Fears When Adopting Virtualization
Razvan Muresan, Razvan Muresan, Security Specialist, Bitdefender
Companies arent prepared for the security challenges of hybrid infrastructures, Bitdefender study reveals.
By Razvan Muresan Razvan Muresan, Security Specialist, Bitdefender, 11/30/2016
Comment0 comments  |  Read  |  Post a Comment
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8903
PUBLISHED: 2019-02-18
index.js in Total.js Platform before 3.2.3 allows path traversal.
CVE-2019-6453
PUBLISHED: 2019-02-18
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
CVE-2019-8372
PUBLISHED: 2019-02-18
The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link an...
CVE-2019-8902
PUBLISHED: 2019-02-18
An issue was discovered in idreamsoft iCMS through 7.0.14. A CSRF vulnerability can delete users' articles via the public/api.php?app=user URI.
CVE-2019-8423
PUBLISHED: 2019-02-18
ZoneMinder through 1.32.3 has SQL Injection via the skins/classic/views/events.php filter[Query][terms][0][cnj] parameter.