Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Botnet Infects Hundreds of Thousands of Websites
Need for 'Guardrails' in Cloud-Native Applications Intensifies
Securing Slack: 5 Tips for Safer Messaging, Collaboration
COVID-19: Latest Security News & Commentary
News & Commentary
Akamai Acquires Asavie
Dark Reading Staff, Quick Hits
Asavie's mobile, IoT, and security products and services will become part of the Akamai Security and Personalization Services product line.
By Dark Reading Staff , 10/27/2020
Comment0 comments  |  Read  |  Post a Comment
Developers' Approach to App Testing Could Cut Flaw Fix Times by 80 Days
Robert Lemos, Contributing WriterNews
An analysis of more than 130,000 active applications found more with at least one high-severity flaw compared with 2019.
By Robert Lemos Contributing Writer, 10/27/2020
Comment0 comments  |  Read  |  Post a Comment
Employees Aware of Emailed Threats Open Suspicious Messages
Dark Reading Staff, Quick Hits
A survey of 1,000 employees finds 96% of employees are aware of digital threats, but 45% click emails they consider to be suspicious.
By Dark Reading Staff , 10/27/2020
Comment0 comments  |  Read  |  Post a Comment
COVID-19: Latest Security News & Commentary
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
By Dark Reading Staff , 10/27/2020
Comment20 comments  |  Read  |  Post a Comment
5 Human Factors That Affect Secure Software Development
Anita D'Amico, CEO, Code Dx Inc.Commentary
With the move to remote work, it's especially important to understand how to support, discourage, and monitor conditions for development teams.
By Anita D'Amico CEO, Code Dx Inc., 10/27/2020
Comment0 comments  |  Read  |  Post a Comment
Neural Networks Help Users Pick More-Secure Passwords
Robert Lemos, Contributing WriterNews
Typically, blocklists are used to prevent users from picking easily guessable patterns, but a small neural network can do the same job and suggests that complex password requirements are not necessary.
By Robert Lemos Contributing Writer, 10/26/2020
Comment0 comments  |  Read  |  Post a Comment
Cybercriminals Extort Psychotherapy Patients Following Vastaamo Breach
Dark Reading Staff, Quick Hits
An attacker is running a Tor site to leak the session notes of 300 patients at Vastaamo, a Finnish psychotherapy facility.
By Dark Reading Staff , 10/26/2020
Comment0 comments  |  Read  |  Post a Comment
New Report Links Cybersecurity and Sustainability
Dark Reading Staff, Quick Hits
Some have also created the role of chief sustainability officer, according to Kaspersky.
By Dark Reading Staff , 10/26/2020
Comment0 comments  |  Read  |  Post a Comment
Teach Your Employees Well: How to Spot Smishing & Vishing Scams
Jennifer Bosavage, Editor In Chief, Solution Providers for Retail
One of the best ways to keep employees from falling victim to these social-engineering attacks is to teach them the signs.
By Jennifer Bosavage Editor In Chief, Solution Providers for Retail, 10/26/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft's Kubernetes Threat Matrix: Here's What's Missing
Gadi Naor, CTO and Co-Founder, AlcideCommentary
With a fuller picture of the Kubernetes threat matrix, security teams can begin to implement mitigation strategies to protect their cluster from threats.
By Gadi Naor CTO and Co-Founder, Alcide, 10/26/2020
Comment0 comments  |  Read  |  Post a Comment
The Story of McAfee: How the Security Giant Arrived at a Second IPO
Kelly Sheridan, Staff Editor, Dark ReadingNews
Industry watchers explore the story of McAfee, from its founding in 1987, to its spinoff from Intel, to how it's keeping up with competitors.
By Kelly Sheridan Staff Editor, Dark Reading, 10/26/2020
Comment0 comments  |  Read  |  Post a Comment
US Treasury Sanctions Russian Institution Linked to Triton Malware
Dark Reading Staff, Quick Hits
Triton, also known as TRISIS and HatMan, was developed to target and manipulate industrial control systems, the US Treasury reports.
By Dark Reading Staff , 10/23/2020
Comment0 comments  |  Read  |  Post a Comment
Cybercriminals Could be Coming After Your Coffee
Curtis Franklin Jr., Senior Editor at Dark Reading
Researchers show no IoT device is too small to fall victim to ransomware techniques.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 10/23/2020
Comment0 comments  |  Read  |  Post a Comment
Flurry of Warnings Highlight Cyber Threats to US Elections
Jai Vijayan, Contributing WriterNews
FBI and intelligence officials issue fresh warnings about election interference attempts by Iranian and Russian threat actors.
By Jai Vijayan Contributing Writer, 10/23/2020
Comment0 comments  |  Read  |  Post a Comment
A Pause to Address 'Ethical Debt' of Facial Recognition
Mike Kiser, Global Security Advocate, Office of the CTO, SailPointCommentary
Ethical use will require some combination of consistent reporting, regulation, corporate responsibility, and adversarial technology.
By Mike Kiser Global Security Advocate, Office of the CTO, SailPoint, 10/23/2020
Comment0 comments  |  Read  |  Post a Comment
Botnet Infects Hundreds of Thousands of Websites
Robert Lemos, Contributing WriterNews
KashmirBlack has been targeting popular content management systems, such as WordPress, Joomla, and Drupal, and using Dropbox and GitHub for communication to hide its presence.
By Robert Lemos Contributing Writer, 10/22/2020
Comment0 comments  |  Read  |  Post a Comment
7 Mobile Browsers Vulnerable to Address-Bar Spoofing
Jai Vijayan, Contributing WriterNews
Flaws allow attackers to manipulate URLs users see on their mobile devices, Rapid7 says.
By Jai Vijayan Contributing Writer, 10/22/2020
Comment0 comments  |  Read  |  Post a Comment
Credential-Stuffing Attacks Plague Loyalty Programs
Ericka Chickowski, Contributing WriterNews
But that's not the only type of web attack cybercriminals have been profiting from.
By Ericka Chickowski Contributing Writer, 10/22/2020
Comment0 comments  |  Read  |  Post a Comment
WordPress Plug-in Updated in Rare Forced Action
Dark Reading Staff, Quick Hits
The Logonizer login security plug-in was automatically updated to patch a SQL injection vulnerability.
By Dark Reading Staff , 10/22/2020
Comment0 comments  |  Read  |  Post a Comment
8 New and Hot Cybersecurity Certifications for 2020
Joan Goodchild, Contributing Writer
While the usual security certs remain popular, interest in privacy skills and cloud experience are pushing new credentials into the market.
By Joan Goodchild Contributing Writer, 10/22/2020
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Security Now Joins Dark Reading

Find out more about the combination of two of the industry's leading cybersecurity news sites.

One of the best ways to keep employees from falling victim to these social-engineering attacks is to teach them the signs.
Researchers show no IoT device is too small to fall victim to ransomware techniques.
While the usual security certs remain popular, interest in privacy skills and cloud experience are pushing new credentials into the market.
Register for Dark Reading Newsletters
Cartoon
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23945
PUBLISHED: 2020-10-27
A SQL injection vulnerability exists in Victor CMS V1.0 in the cat_id parameter of the category.php file. This parameter can be used by sqlmap to obtain data information in the database.
CVE-2020-7754
PUBLISHED: 2020-10-27
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
CVE-2020-6023
PUBLISHED: 2020-10-27
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware.
CVE-2020-8579
PUBLISHED: 2020-10-27
Clustered Data ONTAP versions 9.7 through 9.7P7 are susceptible to a vulnerability which allows an attacker with access to an intercluster LIF to cause a Denial of Service (DoS).
CVE-2020-6022
PUBLISHED: 2020-10-27
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware.
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Flash Poll
Video
Slideshows
Twitter Feed