Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

How to Decipher InfoSec Job Titles' Mysteries
8 Cybersecurity Themes to Expect at Black Hat USA 2020
11 Security Tools to Expect at the Black Hat USA 2020 Arsenal Virtual Event
Q&A: How Systemic Racism Weakens Cybersecurity
COVID-19: Latest Security News & Commentary
News & Commentary
7 Ways to Keep Your Remote Workforce Safe
Steve Zurier, Contributing Writer
These tips will help you chart a course for a security strategy that just may become part of the normal way organizations will function over the next several years.
By Steve Zurier Contributing Writer, 8/14/2020
Comment1 Comment  |  Read  |  Post a Comment
WFH Summer 2020 Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
Clever wordplay on sandcastles, sandboxes, zero trust. and granular controls. And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 8/14/2020
Comment0 comments  |  Read  |  Post a Comment
COVID-19: Latest Security News & Commentary
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
By Dark Reading Staff , 8/14/2020
Comment19 comments  |  Read  |  Post a Comment
CISA Warns of Phishing Campaign with Loan-Relief Lure
Dark Reading Staff, Quick Hits
Phishing emails and fake website promise help with the Small Business Administration's program that aids those affected by COVID-19.
By Dark Reading Staff , 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
Healthcare Industry Sees Respite From Attacks in First Half of 2020
Robert Lemos, Contributing WriterNews
Breach disclosures are down, and reported ransomware attacks have also plummeted. Good news -- or a calm before the storm?
By Robert Lemos Contributing Writer, 8/13/2020
Comment1 Comment  |  Read  |  Post a Comment
Business Email Compromise Attacks Involving MFA Bypass Increase
Jai Vijayan, Contributing WriterNews
Adversaries are using legacy email clients to access and take over accounts protected with strong authentication, Abnormal Security says.
By Jai Vijayan Contributing Writer, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
RedCurl APT Group Hacks Global Companies for Corporate Espionage
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers analyze a presumably Russian-speaking APT group that has been stealing corporate data since 2018.
By Kelly Sheridan Staff Editor, Dark Reading, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
The Race to Hack a Satellite at DEF CON
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Eight teams competed to win cash, bragging rights, and the chance to control a satellite in space.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
Boeing's DEF CON Debut a Sign of the Times
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
In the wake of a stalemate between the airplane manufacturer and a security researcher over vulns found in its 787 aircraft's network, Boeing says it's ready to "embrace" the hacker community.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
Secure Development Takes a (Remote) Village
Guy Podjarny, CEO & Cofounder, SnykCommentary
The shift to work from home isn't just about giving your Dev team the physical tools they need.
By Guy Podjarny CEO & Cofounder, Snyk, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
NSA & FBI Disclose New Russian Cyberespionage Malware
Dark Reading Staff, Quick Hits
APT 28, aka Fancy Bear, is deploying the Drovorub malware designed for Linux systems as part of cyber-espionage operations.
By Dark Reading Staff , 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
Black Hat USA 2020 Shines Spotlight on the Mental Challenges of Cybersecurity
Eric Parizo, Senior Analyst, OmdiaCommentary
Infosec practitioners face a variety of mental struggles in areas such as awareness training, problem solving, or general mental health. Several sessions at Black Hat USA 2020 highlighted these challenges and how to overcome them.
By Eric Parizo Senior Analyst, Omdia, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
Security Jobs With a Future -- And Ones on the Way Out
Joan Goodchild, Contributing Writer
Some titles are hot, while others are not, amid rapidly shifting business priorities.
By Joan Goodchild Contributing Writer, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
With iOS's Privacy Nutrition Label, Apple Upstages Regulators
Heather Federman, VP of Privacy & Policy at BigIDCommentary
New iOS privacy features require developers to disclose what data they're collecting, how they're using it, and with whom they share it.
By Heather Federman VP of Privacy & Policy at BigID, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
Adaptive Shield Emerges From Stealth
Jai Vijayan, Contributing WriterNews
Israeli startup joins growing number of vendors offering platform for detecting and mitigating common configuration errors in cloud environments.
By Jai Vijayan Contributing Writer, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
Emotet Return Brings New Tactics & Evasion Techniques
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security researchers tracking Emotet report its reemergence brings new tricks, including new evasion techniques to bypass security tools.
By Kelly Sheridan Staff Editor, Dark Reading, 8/13/2020
Comment0 comments  |  Read  |  Post a Comment
FireEye Announces New Bug-Bounty Program
Dark Reading Staff, Quick Hits
The program, administered by Bugcrowd, will pay bounties of up to $2,500 per vulnerability.
By Dark Reading Staff , 8/12/2020
Comment0 comments  |  Read  |  Post a Comment
Using 'Data for Good' to Control the Pandemic
Neil Sweeney, Founder & CEO, KilliCommentary
The tech community should unite to develop and distribute a universal COVID-19 contact-tracing application. Here's why and how.
By Neil Sweeney Founder & CEO, Killi, 8/12/2020
Comment0 comments  |  Read  |  Post a Comment
SANS Security Training Firm Hit with Data Breach
Dark Reading Staff, Quick Hits
A phishing email allowed an attacker to compromise a SANS employee's email environment, the organization reports.
By Dark Reading Staff , 8/12/2020
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: 'Rise' and Shine
John Klossner, Cartoonist
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 8/12/2020
Comment5 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Security Now Joins Dark Reading

Find out more about the combination of two of the industry's leading cybersecurity news sites.

Some titles are hot, while others are not, amid rapidly shifting business priorities.
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
What are the tenets and fundamental spirit of zero-trust architecture -- without the marketing speak?
Register for Dark Reading Newsletters
Cartoon
White Papers
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15142
PUBLISHED: 2020-08-14
In openapi-python-client before version 0.5.3, clients generated with a maliciously crafted OpenAPI Document can generate arbitrary Python code. Subsequent execution of this malicious client is arbitrary code execution.
CVE-2020-15145
PUBLISHED: 2020-08-14
In Composer-Setup for Windows before version 6.0.0, if the developer's computer is shared with other users, a local attacker may be able to exploit the following scenarios. 1. A local regular user may modify the existing `C:\ProgramData\ComposerSetup\bin\composer.bat` in order to get elevated comman...
CVE-2020-9708
PUBLISHED: 2020-08-14
The resolveRepositoryPath function doesn't properly validate user input and a malicious user may traverse to any valid Git repository outside the repoRoot. This issue may lead to unauthorized access of private Git repositories as long as the malicious user knows or brute-forces the location of the r...
CVE-2020-15141
PUBLISHED: 2020-08-14
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
CVE-2020-22721
PUBLISHED: 2020-08-14
A File Upload Vulnerability in PNotes - Andrey Gruber PNotes.NET v3.8.1.2 allows a local attacker to execute arbitrary code via the Miscellaneous " External Programs by uploading the malicious .exe file to the external program.
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Flash Poll
Video
Slideshows
Twitter Feed