Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

COVID-19: Latest Security News & Commentary
The Wild, Wild West(world) of Cybersecurity
8 Infosec Page-Turners for Days Spent Indoors
Dark Reading Cybersecurity Crossword Puzzle
State of Cybersecurity Incident Response
News & Commentary
When All Behavior is Abnormal, How Do We Detect Anomalies?
Curtis Franklin Jr., Senior Editor at Dark Reading
Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects of life, is it possible to build baselines and measure normal patterns when nothing at all seems normal?
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/10/2020
Comment0 comments  |  Read  |  Post a Comment
Criminals Selling Videoconferencing Credentials on Dark Web
Robert Lemos, Contributing WriterNews
Two security firms find thousands of usernames and passwords for Zoom accounts for sale and warn that the shift to remote work is changing attackers' targets.
By Robert Lemos Contributing Writer, 4/10/2020
Comment0 comments  |  Read  |  Post a Comment
10 Ways to Spot a Security Fraud
Joshua Goldfarb, Independent ConsultantCommentary
There is no shortage of people presenting themselves as security experts. Some of them truly are. The others...
By Joshua Goldfarb Independent Consultant, 4/10/2020
Comment0 comments  |  Read  |  Post a Comment
COVID-19: Latest Security News & Commentary
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
By Dark Reading Staff , 4/10/2020
Comment4 comments  |  Read  |  Post a Comment
8 Phishing Lures Preying on Pandemic Panic
Ericka Chickowski, Contributing Writer
Phishing campaigns and scams are skyrocketing to take advantage of people concerned about COVID-19 impacts. Here are some key examples in action.
By Ericka Chickowski Contributing Writer, 4/10/2020
Comment0 comments  |  Read  |  Post a Comment
Zscaler to Buy Cloudneeti
Dark Reading Staff, Quick Hits
The security service provider adds cloud security "posture" management with the deal.
By Dark Reading Staff , 4/9/2020
Comment1 Comment  |  Read  |  Post a Comment
Emails Impersonating Trump, White House Seek to Exploit Pandemic Fears
Jai Vijayan, Contributing WriterNews
The phishing campaign is only the latest among many related to COVID-19, INKY says.
By Jai Vijayan Contributing Writer, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
Zoom, Microsoft & NTT Data Leaders Share Work-from-Home Security Tips
Kelly Sheridan, Staff Editor, Dark ReadingQuick Hits
Tech leaders encourage organizations to maintain security awareness training and offer advice on how to protect their information.
By Kelly Sheridan Staff Editor, Dark Reading, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
No STEM, No Problem: How to Close the Security Workforce Gap
Nick Tausek, Security Research Engineer, SwimlaneCommentary
Those who work well with others, learn quickly, and possess a proactive mindset toward the work can make great employees, even if their backgrounds aren't rooted in cybersecurity.
By Nick Tausek Security Research Engineer, Swimlane, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
Schneier on Hacking Society
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
How the hacker mindset and skill set could play a role in improving and securing societal systems, according to renowned security technologist Bruce Schneier.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
Medical Devices on the IoT Put Lives at Risk
Dmitry Raidman, CEO & Co-Founder, CybeatsCommentary
Device security must become as important a product design feature as safety and efficacy.
By Dmitry Raidman CEO & Co-Founder, Cybeats, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
Keeping Vigilant for BEC Amid COVID-19 Chaos
Ericka Chickowski, Contributing WriterNews
FBI and security experts warn that attackers are particularly targeting cloud-based email systems at the moment.
By Ericka Chickowski Contributing Writer, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
After Adopting COVID-19 Lures, Sophisticated Groups Target Remote Workers
Robert Lemos, Contributing WriterNews
While coronavirus-themed emails and files have been used as a lure for weeks, attackers now are searching for ways to actively target VPNs and remote workers to take advantage of weaker security.
By Robert Lemos Contributing Writer, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
Researchers Fool Biometric Scanners with 3D-Printed Fingerprints
Kelly Sheridan, Staff Editor, Dark ReadingNews
Tests on the fingerprint scanners of Apple, Microsoft, and Samsung devices reveal it's possible to bypass authentication with a cheap 3D printer.
By Kelly Sheridan Staff Editor, Dark Reading, 4/8/2020
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Releases COVID-19 Security Guidance
Dark Reading Staff, Quick Hits
Information includes tips on how to keep IT systems infection-free.
By Dark Reading Staff , 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
'Unkillable' Android Malware App Continues to Infect Devices Worldwide
Jai Vijayan, Contributing WriterNews
The xHelper Trojan has compromised over 55,000 devices so far, Kaspersky says.
By Jai Vijayan Contributing Writer, 4/8/2020
Comment1 Comment  |  Read  |  Post a Comment
BEC, Domain Jacking Help Criminals Disrupt Cash Transfers
Shane Shook, Venture Consultant at Forgepoint CapitalCommentary
The two hacking methods occur independently but are being used in concert to steal funds that are part of online payments and transactions.
By Shane Shook Venture Consultant at Forgepoint Capital, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
Accenture Buys Revolutionary Security in Third Acquisition of 2020
Dark Reading Staff, Quick Hits
The deal is intended to strengthen Accenture's critical infrastructure protection capabilities and address more complex IT and OT challenges.
By Dark Reading Staff , 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
Why Threat Hunting with XDR Matters
Morey Haber, CTO and CISO, BeyondTrustCommentary
Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.
By Morey Haber CTO and CISO, BeyondTrust, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
Feline Secure?
Beyond the Edge, Dark Reading
When there's a will, there's a way.
By Beyond the Edge Dark Reading, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Shai Morag
Current Conversations Well Done!
In reply to: Well Done!
Post Your Own Reply
Posted by jenkins8661
Current Conversations Digitized COVID-19 Prevention
In reply to: Caption
Post Your Own Reply
Posted by MagneticPortal
Current Conversations The dead do not laugh...
In reply to: Caption suggestion
Post Your Own Reply
More Conversations
PR Newswire
Security Now Joins Dark Reading

Find out more about the combination of two of the industry's leading cybersecurity news sites.

edge
Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects of life, is it possible to build baselines and measure normal patterns when nothing at all seems normal?
Most enterprise endpoint solutions will support policies to enforce recommended updates.
Maybe security alert fatigue wouldn't be so bad if the alerts themselves delivered less stress and more aromatherapy.
Register for Dark Reading Newsletters
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Yes, I do have virus protection on my system, now what?
White Papers
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11669
PUBLISHED: 2020-04-10
An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.
CVE-2020-1801
PUBLISHED: 2020-04-10
There is an improper authentication vulnerability in several smartphones. Certain function interface in the system does not sufficiently validate the caller's identity in certain share scenario, successful exploit could cause information disclosure. Affected product versions include:Mate 30 Pro vers...
CVE-2020-3952
PUBLISHED: 2020-04-10
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
CVE-2020-4362
PUBLISHED: 2020-04-10
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional is vulnerable to a privilege escalation vulnerability when using token-based authentication in an admin request over the SOAP connector. IBM X-Force ID: 178929.
CVE-2020-1802
PUBLISHED: 2020-04-10
There is an insufficient integrity validation vulnerability in several products. The device does not sufficiently validate the integrity of certain file in certain loading processes, successful exploit could allow the attacker to load a crafted file to the device through USB.Affected product version...
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Flash Poll
Video
Slideshows
Twitter Feed