Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

News & Commentary
Mist Computing Startup Distributes Security AI to the Network Edge
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
MistNet, founded by former Juniper employees, moves AI processing to the network edge to build distributed detection and analysis models for security.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/24/2019
Comment0 comments  |  Read  |  Post a Comment
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at FortinetCommentary
The talent gap is too large for any one sector, and cybersecurity vendors have a big role to play in helping to close it.
By Rob Rashotte VP of Global Training and Technical Field Enablement at Fortinet, 5/24/2019
Comment1 Comment  |  Read  |  Post a Comment
To Manage Security Risk, Manage Data First
Kelly Sheridan, Staff Editor, Dark ReadingNews
At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk.
By Kelly Sheridan Staff Editor, Dark Reading, 5/23/2019
Comment0 comments  |  Read  |  Post a Comment
Google's Origin & the Danger of Link Sharing
Dr. Salvatore Stolfo, Fouder & CTO, Allure SecurityCommentary
How the act of sharing links to files stored in a public cloud puts organizations at risk, and what security teams can do to safeguard data and PII.
By Dr. Salvatore Stolfo Fouder & CTO, Allure Security, 5/23/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Opens Defender ATP for Mac to Public Preview
Dark Reading Staff, Quick Hits
Users of the security platform who have preview features enabled can access Defender ATP for Mac via the Security Center onboarding section.
By Dark Reading Staff , 5/23/2019
Comment0 comments  |  Read  |  Post a Comment
New Software Skims Credit Card Info From Online Credit Card Transactions
Dark Reading Staff, Quick Hits
The new exploit builds a fake frame around legitimate portions of an online commerce website.
By Dark Reading Staff , 5/22/2019
Comment3 comments  |  Read  |  Post a Comment
Consumer IoT Devices Are Compromising Enterprise Networks
Ericka Chickowski, Contributing WriterNews
While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks.
By Ericka Chickowski Contributing Writer, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
49 Million Instagram Influencer Records Exposed in Open Database
Dark Reading Staff, Quick Hits
An AWS-hosted database was configured with no username or password required for access to personal data.
By Dark Reading Staff , 5/21/2019
Comment0 comments  |  Read  |  Post a Comment
Data Security: Think Beyond the Endpoint
Kelly Sheridan, Staff Editor, Dark ReadingNews
A strong data protection strategy is essential as data moves across endpoints and in the cloud.
By Kelly Sheridan Staff Editor, Dark Reading, 5/21/2019
Comment0 comments  |  Read  |  Post a Comment
97% of Americans Cant Ace a Basic Security Test
Steve Zurier, Contributing WriterNews
Still, a new Google study uncovers a bit of good news, too.
By Steve Zurier Contributing Writer, 5/20/2019
Comment8 comments  |  Read  |  Post a Comment
Financial Sector Under Siege
Marc Wilczek, Digital Strategist & CIO AdvisorCommentary
The old take-the-money-and-run approach has been replaced by siege tactics such as DDOS attacks and land-and-expand campaigns with multiple points of persistence and increased dwell time.
By Marc Wilczek Digital Strategist & CIO Advisor, 5/20/2019
Comment0 comments  |  Read  |  Post a Comment
7 Signs of the Rising Threat of Magecart Attacks in 2019
Ericka Chickowski, Contributing Writer
Magecart attacks continue to grow in momentum. Here are the stats and stories that show what's behind the mayhem.
By Ericka Chickowski Contributing Writer, 5/20/2019
Comment0 comments  |  Read  |  Post a Comment
Exposed Elasticsearch Database Compromises Data on 8M People
Dark Reading Staff, Quick Hits
Personal data exposed includes full names, physical and email addresses, birthdates, phone numbers, and IP addresses.
By Dark Reading Staff , 5/17/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft Builds on Decentralized Identity Vision
Kelly Sheridan, Staff Editor, Dark ReadingNews
The company elaborates on its plan to balance data control between businesses and consumers by giving more autonomy to individuals.
By Kelly Sheridan Staff Editor, Dark Reading, 5/15/2019
Comment0 comments  |  Read  |  Post a Comment
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Tweet suggests possible screenshot of stolen city documents and credentials in the wake of attack that took down city servers last week.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/14/2019
Comment1 Comment  |  Read  |  Post a Comment
Effective Pen Tests Follow These 7 Steps
Curtis Franklin Jr., Senior Editor at Dark Reading
Third-party pen tests are part of every comprehensive security plan. Here's how to get the most from this mandatory investment.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/14/2019
Comment0 comments  |  Read  |  Post a Comment
Poorly Configured Server Exposes Most Panama Citizens' Data
Dark Reading Staff, Quick Hits
Compromised information includes full names, birth dates, national ID numbers, medical insurance numbers, and other personal data.
By Dark Reading Staff , 5/13/2019
Comment0 comments  |  Read  |  Post a Comment
78% of Consumers Say Online Companies Must Protect Their Info
Steve Zurier, Contributing WriterNews
Yet 68% agree they also must do more to protect their own information.
By Steve Zurier Contributing Writer, 5/13/2019
Comment1 Comment  |  Read  |  Post a Comment
Symantec CEO Greg Clark Steps Down
Dark Reading Staff, Quick Hits
Exec shake-up comes amid earnings drop in financial report.
By Dark Reading Staff , 5/10/2019
Comment0 comments  |  Read  |  Post a Comment
How the Skills Gap Strains and Constrains Security Pros
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New ISSA/ESG survey underscores increasing pressures and security fallout of a strapped security team.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/9/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I told you we should worry abit more about vendor lock-in.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .