Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

7 Signs of the Rising Threat of Magecart Attacks in 2019
Effective Pen Tests Follow These 7 Steps
Demystifying the Dark Web: What You Need to Know
How Enterprises Are Developing Secure Applications
Name That Toon: End User Lockdown
News & Commentary
Researcher Publishes Four Zero-Day Exploits in Three Days
Robert Lemos, Contributing WriterNews
The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues.
By Robert Lemos Contributing Writer, 5/23/2019
Comment0 comments  |  Read  |  Post a Comment
To Manage Security Risk, Manage Data First
Kelly Sheridan, Staff Editor, Dark ReadingNews
At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk.
By Kelly Sheridan Staff Editor, Dark Reading, 5/23/2019
Comment0 comments  |  Read  |  Post a Comment
Moody's Downgrade of Equifax: A Wake-up Call to Boards
Ericka Chickowski, Contributing WriterNews
The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.
By Ericka Chickowski Contributing Writer, 5/23/2019
Comment0 comments  |  Read  |  Post a Comment
FEC Gives Green Light for Free Cybersecurity Help in Federal Elections
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Official opinion issued by the Federal Election Commission to nonprofit Defending Digital Campaigns is good news for free and reduced-cost security offerings to political candidates and committees.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/23/2019
Comment0 comments  |  Read  |  Post a Comment
Mobile Exploit Fingerprints Devices with Sensor Calibration Data
Dark Reading Staff, Quick Hits
Data from routines intended to calibrate motion sensors can identify individual iOS and Android devices in a newly released exploit.
By Dark Reading Staff , 5/23/2019
Comment0 comments  |  Read  |  Post a Comment
Google's Origin & the Danger of Link Sharing
Dr. Salvatore Stolfo, Fouder & CTO, Allure SecurityCommentary
How the act of sharing links to files stored in a public cloud puts organizations at risk, and what security teams can do to safeguard data and PII.
By Dr. Salvatore Stolfo Fouder & CTO, Allure Security, 5/23/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Opens Defender ATP for Mac to Public Preview
Dark Reading Staff, Quick Hits
Users of the security platform who have preview features enabled can access Defender ATP for Mac via the Security Center onboarding section.
By Dark Reading Staff , 5/23/2019
Comment1 Comment  |  Read  |  Post a Comment
Russian Nation-State Hacking Unit's Tools Get More Fancy
Robert Lemos, Contributing WriterNews
APT28/Fancy Bear has expanded its repertoire to more than 30 commands for infecting systems, executing code, and reconnaissance, researchers have found.
By Robert Lemos Contributing Writer, 5/23/2019
Comment0 comments  |  Read  |  Post a Comment
Incident Response: 3 Easy Traps & How to Avoid Them
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLCCommentary
Sage legal advice about navigating a data breach from a troubleshooting cybersecurity outside counsel.
By Beth Burgin Waller Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC, 5/23/2019
Comment1 Comment  |  Read  |  Post a Comment
Alphabet's Chronicle Explores Code-Signing Abuse in the Wild
Kelly Sheridan, Staff Editor, Dark ReadingNews
A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security.
By Kelly Sheridan Staff Editor, Dark Reading, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
New Software Skims Credit Card Info From Online Credit Card Transactions
Dark Reading Staff, Quick Hits
The new exploit builds a fake frame around legitimate portions of an online commerce website.
By Dark Reading Staff , 5/22/2019
Comment3 comments  |  Read  |  Post a Comment
Data Asset Management: What Do You Really Need?
Kelly Sheridan, Staff Editor, Dark ReadingNews
At Interop, a cybersecurity and privacy leader explains her approach to data management and governance at a massive, decentralized company.
By Kelly Sheridan Staff Editor, Dark Reading, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
Baltimore Email, Other Systems Still Offline from May 7 Ransomware Attack
Dark Reading Staff, Quick Hits
The city's mayor says there's no 'exact timeline on when all systems will be restored.'
By Dark Reading Staff , 5/22/2019
Comment1 Comment  |  Read  |  Post a Comment
Proving the Value of Security Awareness with Metrics that 'Deserve More'
Ira Winkler, CISSP, President, Secure MentemCommentary
Without metrics that matter to the business, awareness programs will continue to be the bastard child of security.
By Ira Winkler CISSP, President, Secure Mentem, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
DDoS Attacks Up in Q1 After Months of Steady Decline
Jai Vijayan, Contributing WriterNews
Sudden surge suggests that new actors have stepped up to the plate to replace the old operators.
By Jai Vijayan Contributing Writer, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
Google Alerts Admins to Unhashed Password Storage
Dark Reading Staff, Quick Hits
The company reports it has seen improper access to, or misuse of, affected enterprise G Suite credentials.
By Dark Reading Staff , 5/22/2019
Comment1 Comment  |  Read  |  Post a Comment
The 3 Cybersecurity Rules of Trust
Ari Singer, CTO at TrustPhiCommentary
Every day, keeping anything secure requires being smart about trust. The rules of trust will keep you and your data safer.
By Ari Singer CTO at TrustPhi, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
Consumer IoT Devices Are Compromising Enterprise Networks
Ericka Chickowski, Contributing WriterNews
While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks.
By Ericka Chickowski Contributing Writer, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
What You Need to Know About Zero Trust Security
Curtis Franklin Jr., Senior Editor at Dark Reading
The zero trust model might be the answer to a world in which perimeters are made to be breached. Is it right for your organization?
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
Satan Ransomware Adds More Evil Tricks
Robert Lemos, Contributing WriterNews
The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.
By Robert Lemos Contributing Writer, 5/21/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
Cartoon Contest
White Papers
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5798
PUBLISHED: 2019-05-23
Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
CVE-2019-5799
PUBLISHED: 2019-05-23
Incorrect inheritance of a new document's policy in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.
CVE-2019-5800
PUBLISHED: 2019-05-23
Insufficient policy enforcement in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.
CVE-2019-5801
PUBLISHED: 2019-05-23
Incorrect eliding of URLs in Omnibox in Google Chrome on iOS prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
CVE-2019-5802
PUBLISHED: 2019-05-23
Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
Flash Poll
Video
Slideshows
Twitter Feed