Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

8 Infosec Page-Turners for Days Spent Indoors
The Wild, Wild West(world) of Cybersecurity
Dark Reading Cybersecurity Crossword Puzzle
State of Cybersecurity Incident Response
10 Security Services Options for SMBs
News & Commentary
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading
These products and services could be of immediate help to infosec pros now protecting their organizations while working from home.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/31/2020
Comment0 comments  |  Read  |  Post a Comment
Researchers Spot Sharp Increase in Zoom-Themed Domain Registrations
Jai Vijayan, Contributing WriterNews
Attackers are attempting to take advantage of the surge in teleworking prompted by COVID-19, Check Point says.
By Jai Vijayan Contributing Writer, 3/30/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Edge Will Tell You If Credentials Are Compromised
Dark Reading Staff, Quick Hits
Password Monitor, InPrivate mode, and ad-tracking prevention are three new additions to Microsoft Edge.
By Dark Reading Staff , 3/30/2020
Comment2 comments  |  Read  |  Post a Comment
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff, Quick Hits
Bug bounty platform provider cited "Voatz's pattern of interactions with the research community" in its decision to halt the app vendor's vuln disclosure program on HackerOne.
By Dark Reading Staff , 3/30/2020
Comment1 Comment  |  Read  |  Post a Comment
Untangling Third-Party Risk (and Fourth, and Fifth...)
Curtis Franklin Jr., Senior Editor at Dark Reading
Third parties bring critical products and services to your organization. They also bring risk that must be understood and managed.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/30/2020
Comment0 comments  |  Read  |  Post a Comment
Securing Your Remote Workforce: A Coronavirus Guide for Businesses
Lance Spitzner, Director, SANS Institute Securing The Human Security Awareness ProgramCommentary
Often the hardest part in creating an effective awareness program is deciding what NOT to teach.
By Lance Spitzner Director, SANS Institute Securing The Human Security Awareness Program, 3/30/2020
Comment0 comments  |  Read  |  Post a Comment
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff, Quick Hits
Victims are being enticed to insert an unknown USB drive into their computers.
By Dark Reading Staff , 3/27/2020
Comment11 comments  |  Read  |  Post a Comment
Virgin Media Could Pay 4.5B for Leak Affecting 900,000 Customers
Dark Reading Staff, Quick Hits
A misconfigured database holding personal data was left available online between April 2019 and February 2020.
By Dark Reading Staff , 3/27/2020
Comment9 comments  |  Read  |  Post a Comment
The Wild, Wild West(world) of Cybersecurity
Bil Harmer​, CISO & Chief Evangelist at SecureAuthCommentary
Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.
By Bil Harmer​ CISO & Chief Evangelist at SecureAuth, 3/27/2020
Comment0 comments  |  Read  |  Post a Comment
Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely
Robert Lemos, Contributing WriterNews
The attack takes control of poorly secured network devices, redirecting Web addresses to a COVID-themed landing page that attempts to fool victims into downloading malware.
By Robert Lemos Contributing Writer, 3/27/2020
Comment0 comments  |  Read  |  Post a Comment
Cyber Version of 'Justice League' Launches to Fight COVID-19 Related Hacks
Jai Vijayan, Contributing WriterNews
Goal is to help organizations especially healthcare entities protect against cybercriminals trying to take advantage of the pandemic.
By Jai Vijayan Contributing Writer, 3/26/2020
Comment0 comments  |  Read  |  Post a Comment
Insurance Giant Chubb Might Be Ransomware Victim
Curtis Franklin Jr., Senior Editor at Dark ReadingQuick Hits
A ransomware operator claims to have successfully attacked Chubb Insurance databases.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/26/2020
Comment0 comments  |  Read  |  Post a Comment
How to Evict Attackers Living Off Your Land
Joan Goodchild, Contributing Writer
As cyber defenses improve, adversaries are shifting to stealthy "living-off-the-land" attacks that use targets' own tools against them. Here are some tips to defend your turf.
By Joan Goodchild Contributing Writer, 3/26/2020
Comment0 comments  |  Read  |  Post a Comment
How Zoom, Netflix, and Dropbox are Staying Online During the Pandemic
Dark Reading Staff, News
Inside the efforts to keep the quarantined world's popular Internet services running smoothly.
By Special to Dark Reading: Yevgeniy Sverdlik, Data Center Knowledge , 3/26/2020
Comment1 Comment  |  Read  |  Post a Comment
10 Security Services Options for SMBs
Steve Zurier, Contributing Writer
Outsourcing security remains one of the best ways for small to midsize businesses to protect themselves from cyberthreats.
By Steve Zurier Contributing Writer, 3/26/2020
Comment0 comments  |  Read  |  Post a Comment
Security Not a Priority for SAP Projects, Users Report
Dark Reading Staff, Quick Hits
Nearly 70% of SAP users surveyed believe organizations lacked focus on IT security during previous SAP implementations.
By Dark Reading Staff , 3/26/2020
Comment7 comments  |  Read  |  Post a Comment
3 Mobile Security Problems That Most Security Teams Haven't Fixed Yet
Michael J. Covington, Vice President of Product Strategy at WanderaCommentary
Mobility must be included in the security operations workflow so that company data is protected regardless of where remote workers are located.
By Michael J. Covington Vice President of Product Strategy at Wandera, 3/26/2020
Comment1 Comment  |  Read  |  Post a Comment
Technology Empowers Pandemic Response, But Privacy Worries Remain
Robert Lemos, Contributing WriterNews
As technology companies and the medical community work to find ways to track and test for the virus, privacy might fall by the wayside.
By Robert Lemos Contributing Writer, 3/26/2020
Comment0 comments  |  Read  |  Post a Comment
Introducing Zero-Trust Access
Rik Turner, Principal Analyst, Infrastructure Solutions, OmdiaCommentary
It's too early to tell whether ZTA will be a VPN killer or not, but major players are ramping up products in this new class of security technology that focuses on the cloud.
By Rik Turner Principal Analyst, Infrastructure Solutions, Omdia, 3/26/2020
Comment6 comments  |  Read  |  Post a Comment
China-Based Threat Group Launches Widespread Malicious Campaign
Jai Vijayan, Contributing WriterNews
The motives behind the attacks remain unclear, but likely triggers include the ongoing trade war between the US and China and the unfolding COVID-19 pandemic.
By Jai Vijayan Contributing Writer, 3/26/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Security Now Joins Dark Reading

Find out more about the combination of two of the industry's leading cybersecurity news sites.

edge
Third parties bring critical products and services to your organization. They also bring risk that must be understood and managed.
As cyber defenses improve, adversaries are shifting to stealthy "living-off-the-land" attacks that use targets' own tools against them. Here are some tips to defend your turf.
Two security awareness advocates from KnowBe4 provide some solid suggestions.
Register for Dark Reading Newsletters
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I feel safe, but I can't understand a word he's saying."
White Papers
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11111
PUBLISHED: 2020-03-31
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
CVE-2020-11112
PUBLISHED: 2020-03-31
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
CVE-2020-11113
PUBLISHED: 2020-03-31
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
CVE-2020-10374
PUBLISHED: 2020-03-30
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
CVE-2020-11104
PUBLISHED: 2020-03-30
An issue was discovered in USC iLab cereal through 1.3.0. Serialization of an (initialized) C/C++ long double variable into a BinaryArchive or PortableBinaryArchive leaks several bytes of stack or heap memory, from which sensitive information (such as memory layout or private keys) can be gleaned if...
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Flash Poll
Video
Slideshows
Twitter Feed