Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

8 Cybersecurity Themes to Expect at Black Hat USA 2020
11 Security Tools to Expect at the Black Hat USA 2020 Arsenal Virtual Event
Vulnerable Invisible Salamanders and You: A Tale of Encryption Weakness
Q&A: How Systemic Racism Weakens Cybersecurity
COVID-19: Latest Security News & Commentary
News & Commentary
11 Hot Startups to Watch at Black Hat USA
Kelly Sheridan, Staff Editor, Dark Reading
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.
By Kelly Sheridan Staff Editor, Dark Reading, 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
FBI Warns on New E-Commerce Fraud
Dark Reading Staff, News
A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.
By Dark Reading Staff , 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat
Jai Vijayan, Contributing WriterNews
"Taidoor" is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.
By Jai Vijayan Contributing Writer, 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing WriterNews
Emerging streamlined curriculum programs aim to help narrow the skills gap.
By Nicole Ferraro Contributing Writer, 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
Why Data Ethics Is a Growing CISO Priority
Joan Goodchild, Contributing Writer
With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.
By Joan Goodchild Contributing Writer, 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020
Eric Parizo, Senior Analyst, OmdiaCommentary
Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.
By Eric Parizo Senior Analyst, Omdia, 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
Travel Management Firm CWT Pays $4.5M to Ransomware Attackers
Dark Reading Staff, Quick Hits
Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.
By Dark Reading Staff , 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
A Patriotic Solution to the Cybersecurity Skills Shortage
Adam Benson, Senior VP, Vrge StrategiesCommentary
Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.
By Adam Benson Senior VP, Vrge Strategies, 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
COVID-19: Latest Security News & Commentary
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
By Dark Reading Staff , 8/3/2020
Comment17 comments  |  Read  |  Post a Comment
How Should I Securely Destroy/Discard My Devices?
Kurtis Minder, co-Founder & CEO, GroupSense
While it is possible to do data destruction in-house, doing it correctly and at scale can be tedious.
By Kurtis Minder co-Founder & CEO, GroupSense, 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
3 Arrested for Massive Twitter Breach
Kelly Sheridan, Staff Editor, Dark ReadingQuick Hits
Three individuals aged 17, 19, and 22 have been charged for their alleged roles in the massive July 15 Twitter attack.
By Kelly Sheridan Staff Editor, Dark Reading, 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
New Initiative Links Cybersecurity Pros to Election Officials
Dark Reading Staff, Quick Hits
A University of Chicago Harris School of Public Policy initiative will build a database of cybersecurity volunteers.
By Dark Reading Staff , 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
Twitter: Employees Compromised in Phone Spear-Phishing Attack
Dark Reading Staff, Quick Hits
The attack earlier this month started with a spear-phishing attack targeting Twitter employees, the company says in a new update.
By Dark Reading Staff , 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
3 Ways Social Distancing Can Strengthen Your Network
Dr. Mike Lloyd, CTO of RedSealCommentary
Security teams can learn a lot from the current pandemic to make modern hybrid business networks stronger and more resilient. Here's how.
By Dr. Mike Lloyd CTO of RedSeal, 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
'Hidden Property Abusing' Allows Attacks on Node.js Applications
Robert Lemos, Contributing WriterNews
A team of researchers from Georgia Tech find a new attack technique that targets properties in Node.js and plan to publicly release a tool that has already identified 13 new vulnerabilities.
By Robert Lemos Contributing Writer, 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark ReadingNews
Apple, Google, and Mozilla will shorten the life span for TLS certificates in a move poised to aid security but cause operational troubles.
By Kelly Sheridan Staff Editor, Dark Reading, 7/30/2020
Comment1 Comment  |  Read  |  Post a Comment
Dark Web Travel Fraudsters Left Hurting From Lockdowns
Ericka Chickowski, Contributing WriterNews
Shadow travel businesses that depend on loyalty program fraud have been impacted just like the legitimate travel orgs they prey on.
By Ericka Chickowski Contributing Writer, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
Mimecast Buys MessageControl
Dark Reading Staff, Quick Hits
The email security provider brings into its fold social engineering and human identity capabilities.
By Dark Reading Staff , 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
Ill-Defined Career Paths Hamper Growth for IT Security Pros
Jai Vijayan, Contributing WriterNews
Appsec and cloud security skills are the most in demand, and a shortage of staff is wearing on security teams, a new study shows.
By Jai Vijayan Contributing Writer, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
5 Tips for Optimizing Your Company's Cyber-Crisis Preparedness
James Hadley, CEO at Immersive LabsCommentary
Cyber-incident response often addresses short-term needs, but we need to broaden the view of crisis management to be more forward-thinking.
By James Hadley CEO at Immersive Labs, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Security Now Joins Dark Reading

Find out more about the combination of two of the industry's leading cybersecurity news sites.

edge
Figuring out which cybersecurity job you want -- or are qualified for -- can be difficult when words have no consistent meaning in the industry.
Robotic Process Automation (RPA) is the next big thing in innovation and digital strategy. But what security details are overlooked in the rush to implement bots?
A Black Hat presentation will discuss how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.
Register for Dark Reading Newsletters
Cartoon Contest
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11583
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.
CVE-2020-11584
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.
CVE-2020-5770
PUBLISHED: 2020-08-03
Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.01 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.
CVE-2020-5771
PUBLISHED: 2020-08-03
Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious backup archive.
CVE-2020-5772
PUBLISHED: 2020-08-03
Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious package file.
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Flash Poll
Video
Slideshows
Twitter Feed