Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
The Edge Cartoon Contest: You Better Watch Out ...
6 Top Nontechnical Degrees for Cybersecurity
A Cause You Care About Needs Your Cybersecurity Help
Rethinking Enterprise Data Defense
News & Commentary
Visa Warns of Targeted PoS Attacks on Gas Station Merchants
Jai Vijayan, Contributing WriterNews
At least two North American chains have been hit in sophisticated new campaigns for stealing payment card data.
By Jai Vijayan Contributing Writer, 12/13/2019
Comment0 comments  |  Read  |  Post a Comment
'Motivating People Who Want the Struggle': Expert Advice on InfoSec Leadership
Joan Goodchild, Contributing Writer
Industry veteran and former Intel security chief Malcolm Harkins pinpoints three essential elements for leaders to connect with their employees and drive business objectives.
By Joan Goodchild Contributing Writer, 12/13/2019
Comment0 comments  |  Read  |  Post a Comment
Fortinet Buys CyberSponse for SOAR Capabilities
Dark Reading Staff, Quick Hits
It plans to integrate CyberSponse's SOAR platform into the Fortinet Security Fabric.
By Dark Reading Staff , 12/13/2019
Comment0 comments  |  Read  |  Post a Comment
Endpoint Protection: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
Trojans, knights, and medieval wordplay. And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 12/13/2019
Comment0 comments  |  Read  |  Post a Comment
Lessons Learned from 7 Big Breaches in 2019
Jai Vijayan, Contributing Writer
Capital One, Macy's, FEMA, and others: key takeaways from the year's most notable breaches.
By Jai Vijayan Contributing Writer, 12/13/2019
Comment0 comments  |  Read  |  Post a Comment
Android App Analysis Uncovers Seasonal Shopping Risk
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers scanned 4,200 Android apps and found many exhibit malicious behavior or have a dangerous level of permissions.
By Kelly Sheridan Staff Editor, Dark Reading, 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
Cyberattacks on Retailers Could Increase 20% this Holiday Season
Jai Vijayan, Contributing WriterNews
Commodity malware and ransomware continue to be the biggest threats, says VMWare Carbon Black.
By Jai Vijayan Contributing Writer, 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
The Most, Least Insecure US Cities for SMBs
Dark Reading Staff, Quick Hits
A new report looks at computer activity in the 50 largest metropolitan areas.
By Dark Reading Staff , 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
Gallium: The Newest Threat Group on Microsoft's Radar
Kelly Sheridan, Staff Editor, Dark ReadingNews
Hacking group has been targeting telecommunication providers.
By Kelly Sheridan Staff Editor, Dark Reading, 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
Get Organized Like a Villain
Rob Ragan & Alex DeFreese, Principal Security Researcher & Managing Security Associate at Bishop FoxCommentary
What cybercrime group FIN7 can teach us about using agile frameworks.
By Rob Ragan & Alex DeFreese Principal Security Researcher & Managing Security Associate at Bishop Fox, 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
Thanks, Larry!
Beyond the Edge, Dark Reading
A no-tech trick, a la social engineering, can lead to huge corporate security consequences -- and it might just score the criminal a new car.
By Beyond the Edge Dark Reading, 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
Smart Building Security Awareness Grows
Dark Reading Staff, News
In 2020, expect to hear more about smart building security.
By Special to Dark Reading: Brian Buntz, IoT World Today , 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing WriterNews
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.
By Robert Lemos Contributing Writer, 12/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Waking Up to Third-Party Security Risk
Robert Bigman, Former CISO at CIA, Independent ConsultantCommentary
You can't rely on the words, intentions, or security measures of others to guard your company, customer and brand.
By Robert Bigman Former CISO at CIA, Independent Consultant, 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
Trickbot Operators Now Selling Attack Tools to APT Actors
Jai Vijayan, Contributing WriterNews
North Korea's Lazarus Group - of Sony breach and WannaCry fame - is among the first customers.
By Jai Vijayan Contributing Writer, 12/11/2019
Comment0 comments  |  Read  |  Post a Comment
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers were able to extract AES encryption key using SGX's voltage-tuning function.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/11/2019
Comment1 Comment  |  Read  |  Post a Comment
The Next Security Silicon Valley: Coming to a City Near You?
Sara Peters, Senior Editor at Dark Reading
The high cost of doing business in California's San Francisco Bay Area is just one factor driving infosec companies established and and startups, alike to pursue their fortunes elsewhere. Here's where many are going.
By Sara Peters Senior Editor at Dark Reading, 12/11/2019
Comment0 comments  |  Read  |  Post a Comment
5 Tips for Keeping Your Security Team on Target
Joshua Goldfarb, Independent ConsultantCommentary
In nearly every security environment, competing priorities are a constant battleground. Here's how to keep the focus on what's important.
By Joshua Goldfarb Independent Consultant, 12/11/2019
Comment0 comments  |  Read  |  Post a Comment
Google Chrome Now Automatically Alerts Users on Compromised Passwords
Dark Reading Staff, Quick Hits
A series of security enhancements seek to protect users from phishing and warn them when credentials have been compromised.
By Dark Reading Staff , 12/11/2019
Comment1 Comment  |  Read  |  Post a Comment
Younger Generations Drive Bulk of 2FA Adoption
Kelly Sheridan, Staff Editor, Dark ReadingNews
Use of two-factor authentication has nearly doubled in the past two years , pointing to a new wave of acceptance.
By Kelly Sheridan Staff Editor, Dark Reading, 12/11/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by iamkelly
Current Conversations nice
In reply to: Re: very nice
Post Your Own Reply
Posted by herryjone
Current Conversations nice
In reply to: Re: very nice
Post Your Own Reply
More Conversations
PR Newswire
edge
edge
Industry veteran and former Intel security chief Malcolm Harkins pinpoints three essential elements for leaders to connect with their employees and drive business objectives.
The high cost of doing business in California's San Francisco Bay Area is just one factor driving infosec companies -- established and and startups, alike -- to pursue their fortunes elsewhere. Here's where many are going.
No longer can you secure the perimeter and trust that nothing will get in or out.
Register for Dark Reading Newsletters
Cartoon
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Flash Poll
Video
Slideshows
Twitter Feed