Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

News & Commentary
Former Salesforce Execs Launch Data Protection Startup
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Cloud-based API service stores and manages sensitive consumer data with a zero-trust, database-as-a service approach.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/22/2020
Comment0 comments  |  Read  |  Post a Comment
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading
Mobile security experts share their go-to advice for protecting iPhones from hackers, thieves, and fraudsters.
By Kelly Sheridan Staff Editor, Dark Reading, 5/22/2020
Comment1 Comment  |  Read  |  Post a Comment
Hackers Serve Up Stolen Credentials from Home Chef
Dark Reading Staff, Quick Hits
Some 8 million of the meal delivery company's customer records have been offered for sale on the Dark Web.
By Dark Reading Staff , 5/21/2020
Comment0 comments  |  Read  |  Post a Comment
Telcos Become Richer Hacking Targets
Alison Diana, Contributing WriterNews
The shift of moving telecommunications networks toward more commercial networking equipment and systems also expanded their attack surface.
By Alison Diana Contributing Writer, 5/21/2020
Comment0 comments  |  Read  |  Post a Comment
Web Application Attacks Double from 2019: Verizon DBIR
Kelly Sheridan, Staff Editor, Dark ReadingNews
Verizon's annual data breach report shows most attackers are external, money remains their top motivator, and web applications and unsecured cloud storage are hot targets.
By Kelly Sheridan Staff Editor, Dark Reading, 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Open Sources Its Coronavirus Threat Data
Dark Reading Staff, Quick Hits
Microsoft's COVID-19 intelligence will be made publicly available to help businesses fight virus-related security threats.
By Dark Reading Staff , 5/15/2020
Comment0 comments  |  Read  |  Post a Comment
As Businesses Rush to the Cloud, Security Teams Struggle to Keep Up
Kelly Sheridan, Staff Editor, Dark ReadingNews
Most organizations have a gap between current and planned cloud usage and the maturity of their cloud security programs.
By Kelly Sheridan Staff Editor, Dark Reading, 5/14/2020
Comment0 comments  |  Read  |  Post a Comment
8 Supply Chain Security Requirements
Curtis Franklin Jr., Senior Editor at Dark Reading
Complex supply chains have complex security requirements, but secure them you must. Here's where to start.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/14/2020
Comment1 Comment  |  Read  |  Post a Comment
Organizations Conduct App Penetration Tests More Frequently - and Broadly
Jai Vijayan, Contributing WriterNews
Compliance is no longer the primary motivator. AppSec is, Cobalt.io says.
By Jai Vijayan Contributing Writer, 5/13/2020
Comment0 comments  |  Read  |  Post a Comment
CyberArk Acquires Idaptive for Identity-as-a-Service Tech
Dark Reading Staff, Quick Hits
The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.
By Dark Reading Staff , 5/13/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Fixes 111 Vulnerabilities for Patch Tuesday
Kelly Sheridan, Staff Editor, Dark ReadingNews
This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.
By Kelly Sheridan Staff Editor, Dark Reading, 5/12/2020
Comment0 comments  |  Read  |  Post a Comment
As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints
Robert Lemos, Contributing WriterNews
A majority of firms expect to keep more employees working remotely post-pandemic, forcing businesses to undertake more comprehensive digital and cloud transformations.
By Robert Lemos Contributing Writer, 5/8/2020
Comment0 comments  |  Read  |  Post a Comment
Why DevSecOps Is Critical for Containers and Kubernetes
Kirsten Newcomer, Senior Principal Product Manager at Red Hat OpenShiftCommentary
DevSecOps is a big and sometimes difficult shift for organizations. The key to success? Take small steps.
By Kirsten Newcomer Senior Principal Product Manager at Red Hat OpenShift, 5/8/2020
Comment0 comments  |  Read  |  Post a Comment
Malicious Bots Infiltrate Online Food Delivery
Nicole Ferraro, Contributing WriterNews
With grocery delivery in higher demand than ever, new add-ons have emerged to secure slots for consumers, presenting a new pathway for bad bots to wreak havoc.
By Nicole Ferraro Contributing Writer, 5/7/2020
Comment0 comments  |  Read  |  Post a Comment
Breach Hits GoDaddy SSH Customers
Dark Reading Staff, Quick Hits
The October 2019 breach left some customer data open to hacking eyes.
By Dark Reading Staff , 5/5/2020
Comment0 comments  |  Read  |  Post a Comment
Cloud Startup Orca Security Raises $20M Series A
Dark Reading Staff, Quick Hits
The Israeli cloud security startup has built a platform to help organizations gain greater visibility into multicloud deployments.
By Dark Reading Staff , 5/5/2020
Comment0 comments  |  Read  |  Post a Comment
SMB Security Catches Up to Large Companies, Data Shows
Kelly Sheridan, Staff Editor, Dark ReadingNews
Small and midsize businesses face issues similar to those of large organizations and have updated security practices to respond with threat hunting, patch management, and dedicated personnel.
By Kelly Sheridan Staff Editor, Dark Reading, 5/4/2020
Comment1 Comment  |  Read  |  Post a Comment
7 Tips for Security Pros Patching in a Pandemic
Kelly Sheridan, Staff Editor, Dark Reading
The shift to remote work has worsened patch management challenges and created new ones. Security pros share insights and best practices.
By Kelly Sheridan Staff Editor, Dark Reading, 5/4/2020
Comment0 comments  |  Read  |  Post a Comment
Fake Microsoft Teams Emails Phish for Credentials
Jai Vijayan, Contributing WriterNews
Employees belonging to organizations in industries such as energy, retail, and hospitality have been recipients, Abnormal Security says.
By Jai Vijayan Contributing Writer, 5/1/2020
Comment3 comments  |  Read  |  Post a Comment
Microsoft's Records Management Tool Aims to Simplify Data Governance
Kelly Sheridan, Staff Editor, Dark ReadingNews
Records Management is intended to help businesses manage security and data governance as more struggle to handle increased amounts of data and regulatory requirements.
By Kelly Sheridan Staff Editor, Dark Reading, 4/30/2020
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by sandiegopools
Current Conversations Great
In reply to: Re: Pending Review
Post Your Own Reply
More Conversations
PR Newswire
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5537
PUBLISHED: 2020-05-25
Cybozu Desktop for Windows 2.0.23 to 2.2.40 allows remote code execution via unspecified vectors.
CVE-2020-13438
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has an invalid read in jfif_encode in jfif.c.
CVE-2020-13439
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has a heap-based buffer over-read in jfif_decode in jfif.c.
CVE-2020-13440
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has an invalid write in bmp_load in bmp.c.
CVE-2020-13433
PUBLISHED: 2020-05-24
Jason2605 AdminPanel 4.0 allows SQL Injection via the editPlayer.php hidden parameter.