10 Security Product Flaw Scares
10 Hot Cybersecurity Funding Rounds in Q3
Paul Vixie: How CISOs Can Use DNS to Up Security
Attacking Developers Using 'Shadow Containers'
Dark Reading INsecurity Conference Registration Now Open
News & Commentary
Why Your Business Must Care about Privacy
Niko Keller, Co-founder and CTO of Opaque CommunicationsCommentary
It might not have something to hide, but it definitely has something to protect.
By Niko Keller Co-founder and CTO of Opaque Communications, 9/26/2017
Comment0 comments  |  Read  |  Post a Comment
Equifax CEO Retires in Wake of Breach
Dark Reading Staff, Quick Hits
After the company's CIO and CSO resigned Sep. 14, Chairman and CEO Richard F. Smith follows them out the door.
By Dark Reading Staff , 9/26/2017
Comment0 comments  |  Read  |  Post a Comment
FBI's Freese Shares Risk Management Tips
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Deputy Assistant Director Donald Freese advises enterprises to lead with a business case and not fear addressing the C-suite on risk management.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/26/2017
Comment0 comments  |  Read  |  Post a Comment
After DHS Notice, 21 States Reveal They Were Targeted During Election
Dark Reading Staff, Quick Hits
Election officials in swing states Florida, Ohio, and Pennsylvania among those who report Russian state-sponsored attackers targeted their systems.
By Dark Reading Staff , 9/25/2017
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Builds Automation into Windows Defender ATP
Kelly Sheridan, Associate Editor, Dark ReadingNews
Automation can help manage and respond to alert overflow, but will come with its own specific set of challenges.
By Kelly Sheridan Associate Editor, Dark Reading, 9/25/2017
Comment0 comments  |  Read  |  Post a Comment
Breach at Deloitte Exposes Emails, Client Data
Jai Vijayan, Freelance writerNews
Intrusion may have resulted from company's failure to properly secure a key administrator account.
By Jai Vijayan Freelance writer, 9/25/2017
Comment1 Comment  |  Read  |  Post a Comment
Privacy Shield Framework Gains Popularity in EU, US: Report
Dark Reading Staff, Quick Hits
The IAPP-EY Privacy Governance Survey shows marked interest in the Privacy Shield framework to transfer personal data.
By Dark Reading Staff , 9/25/2017
Comment0 comments  |  Read  |  Post a Comment
PassGAN: Password Cracking Using Machine Learning
Jai Vijayan, Freelance writerNews
Researchers demo how deep neural networks can be trained to generate passwords better than the best password-cracking tools.
By Jai Vijayan Freelance writer, 9/25/2017
Comment1 Comment  |  Read  |  Post a Comment
Security's #1 Problem: Economic Incentives
Dimitri Stiliadis, CEO of AporetoCommentary
The industry rewards cutting corners rather than making software safe. Case in point: the Equifax breach.
By Dimitri Stiliadis CEO of Aporeto, 9/25/2017
Comment3 comments  |  Read  |  Post a Comment
1.4 Million New Phishing Sites Launched Each Month
Dark Reading Staff, Quick Hits
The number of phishing attacks reach a record rate in 2017, but the majority of the phishing sites remain active for just four- to eight hours.
By Dark Reading Staff , 9/22/2017
Comment1 Comment  |  Read  |  Post a Comment
Americans Rank Criminal Hacking as Their Number One Threat
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Global warming and artificial intelligence rate as less of a threat to human health, safety, and prosperity, than getting hacked, according to a survey released today.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/22/2017
Comment0 comments  |  Read  |  Post a Comment
10 Security Product Flaw Scares
Ericka Chickowski, Contributing Writer, Dark Reading
CCleaner compromise puts the crown on several years' worth of headlines about cybersecurity product weaknesses.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/22/2017
Comment2 comments  |  Read  |  Post a Comment
Health IT & Cybersecurity: 5 Hiring Misconceptions to Avoid
Clyde Hewitt, Vice President, Security Strategy, CynergisTekCommentary
Why healthcare organizations need a good strategy to find talent, or get left behind.
By Clyde Hewitt Vice President, Security Strategy, CynergisTek, 9/22/2017
Comment2 comments  |  Read  |  Post a Comment
Where Do Security Vulnerabilities Come From?
Raymond Pompon, Principal Threat Research Evangelist at F5 Networks
There are three major causes: code quality, complexity, and trusted data inputs.
By Raymond Pompon Principal Threat Research Evangelist at F5 Networks, 9/22/2017
Comment0 comments  |  Read  |  Post a Comment
SEC Says Intruders May Have Accessed Insider Data for Illegal Trading
Jai Vijayan, Freelance writerNews
2016 breach of the Securities and Exchange Commission's EDGAR database dents its reputation as a federal cybersecurity enforcer.
By Jai Vijayan Freelance writer, 9/21/2017
Comment0 comments  |  Read  |  Post a Comment
CCleaner Malware Targeted Tech Giants Cisco, Google, Microsoft
Kelly Sheridan, Associate Editor, Dark ReadingNews
The backdoor discovered in Avast's CCleaner targeted top tech companies including Google, Microsoft, Samsung, Sony, VMware, and Cisco.
By Kelly Sheridan Associate Editor, Dark Reading, 9/21/2017
Comment0 comments  |  Read  |  Post a Comment
Why Size Doesn't Matter in DDoS Attacks
Nicolai Bezsonoff, General Manager, Security Solutions, NeustarCommentary
Companies both large and small are targets. Never think "I'm not big enough for a hacker's attention."
By Nicolai Bezsonoff General Manager, Security Solutions, Neustar, 9/21/2017
Comment1 Comment  |  Read  |  Post a Comment
SMBs Paid $301 Million to Ransomware Attackers
Dark Reading Staff, Quick Hits
But small- to midsized businesses are taking a tougher stand against ransomware attacks, according to a survey released today of the 2016-2017 period.
By Dark Reading Staff , 9/21/2017
Comment2 comments  |  Read  |  Post a Comment
OPM Data Breach Lawsuit Tossed, Fed Plaintiffs will Appeal
Dark Reading Staff, Quick Hits
A judge ruled federal employees cannot sue for damages from the 2015 Office of Personnel Management data breach.
By Dark Reading Staff , 9/21/2017
Comment17 comments  |  Read  |  Post a Comment
Iranian Cyberspy Group Targets Aerospace, Energy Firms
Jai Vijayan, Freelance writerNews
APT33 focused on gathering information to bolster Iran's aviation industry and military decision-making capability, FireEye says.
By Jai Vijayan Freelance writer, 9/20/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
1.9 Billion Data Records Exposed in First Half of 2017
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/20/2017
Get Serious about IoT Security
Derek Manky, Global Security Strategist, Fortinet,  9/20/2017
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack. Read >>
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
White Papers
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

The Dark Reading Security Spending Survey
The Dark Reading Security Spending Survey
Enterprises are spending an unprecedented amount of money on IT security where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download the report and find out what they had to say.
Flash Poll
Video
Slideshows
Twitter Feed