Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

COVID-19: Latest Security News & Commentary
The Wild, Wild West(world) of Cybersecurity
8 Infosec Page-Turners for Days Spent Indoors
Dark Reading Cybersecurity Crossword Puzzle
State of Cybersecurity Incident Response
News & Commentary
8 Phishing Lures Preying on Pandemic Panic
Ericka Chickowski, Contributing Writer
Phishing campaigns and scams are skyrocketing to take advantage of people concerned about COVID-19 impacts. Here are some key examples in action.
By Ericka Chickowski Contributing Writer, 4/10/2020
Comment0 comments  |  Read  |  Post a Comment
Zscaler to Buy Cloudneeti
Dark Reading Staff, Quick Hits
The security service provider adds cloud security "posture" management with the deal.
By Dark Reading Staff , 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
Emails Impersonating Trump, White House Seek to Exploit Pandemic Fears
Jai Vijayan, Contributing WriterNews
The phishing campaign is only the latest among many related to COVID-19, INKY says.
By Jai Vijayan Contributing Writer, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
Zoom, Microsoft & NTT Data Leaders Share Work-from-Home Security Tips
Kelly Sheridan, Staff Editor, Dark ReadingQuick Hits
Tech leaders encourage organizations to maintain security awareness training and offer advice on how to protect their information.
By Kelly Sheridan Staff Editor, Dark Reading, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
No STEM, No Problem: How to Close the Security Workforce Gap
Nick Tausek, Security Research Engineer, SwimlaneCommentary
Those who work well with others, learn quickly, and possess a proactive mindset toward the work can make great employees, even if their backgrounds aren't rooted in cybersecurity.
By Nick Tausek Security Research Engineer, Swimlane, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
Schneier on Hacking Society
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
How the hacker mindset and skill set could play a role in improving and securing societal systems, according to renowned security technologist Bruce Schneier.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
Medical Devices on the IoT Put Lives at Risk
Dmitry Raidman, CEO & Co-Founder, CybeatsCommentary
Device security must become as important a product design feature as safety and efficacy.
By Dmitry Raidman CEO & Co-Founder, Cybeats, 4/9/2020
Comment0 comments  |  Read  |  Post a Comment
Keeping Vigilant for BEC Amid COVID-19 Chaos
Ericka Chickowski, Contributing WriterNews
FBI and security experts warn that attackers are particularly targeting cloud-based email systems at the moment.
By Ericka Chickowski Contributing Writer, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
After Adopting COVID-19 Lures, Sophisticated Groups Target Remote Workers
Robert Lemos, Contributing WriterNews
While coronavirus-themed emails and files have been used as a lure for weeks, attackers now are searching for ways to actively target VPNs and remote workers to take advantage of weaker security.
By Robert Lemos Contributing Writer, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
Researchers Fool Biometric Scanners with 3D-Printed Fingerprints
Kelly Sheridan, Staff Editor, Dark ReadingNews
Tests on the fingerprint scanners of Apple, Microsoft, and Samsung devices reveal it's possible to bypass authentication with a cheap 3D printer.
By Kelly Sheridan Staff Editor, Dark Reading, 4/8/2020
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Releases COVID-19 Security Guidance
Dark Reading Staff, Quick Hits
Information includes tips on how to keep IT systems infection-free.
By Dark Reading Staff , 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
'Unkillable' Android Malware App Continues to Infect Devices Worldwide
Jai Vijayan, Contributing WriterNews
The xHelper Trojan has compromised over 55,000 devices so far, Kaspersky says.
By Jai Vijayan Contributing Writer, 4/8/2020
Comment1 Comment  |  Read  |  Post a Comment
BEC, Domain Jacking Help Criminals Disrupt Cash Transfers
Shane Shook, Venture Consultant at Forgepoint CapitalCommentary
The two hacking methods occur independently but are being used in concert to steal funds that are part of online payments and transactions.
By Shane Shook Venture Consultant at Forgepoint Capital, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
Accenture Buys Revolutionary Security in Third Acquisition of 2020
Dark Reading Staff, Quick Hits
The deal is intended to strengthen Accenture's critical infrastructure protection capabilities and address more complex IT and OT challenges.
By Dark Reading Staff , 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
Why Threat Hunting with XDR Matters
Morey Haber, CTO and CISO, BeyondTrustCommentary
Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.
By Morey Haber CTO and CISO, BeyondTrust, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
Feline Secure?
Beyond the Edge, Dark Reading
When there's a will, there's a way.
By Beyond the Edge Dark Reading, 4/8/2020
Comment0 comments  |  Read  |  Post a Comment
Privacy & Digital-Rights Experts Worry Contact-Tracing Apps Lack Limits
Robert Lemos, Contributing WriterNews
Mobile-phone-based tracking of people can help fight pandemics, but privacy and security researchers stress that it needs to be done right.
By Robert Lemos Contributing Writer, 4/7/2020
Comment0 comments  |  Read  |  Post a Comment
Chinese APT Groups Targeted Enterprise Linux Systems in Decade-Long Data Theft Campaign
Jai Vijayan, Contributing WriterNews
Organizations across multiple industries compromised in a systematic effort to steal IP and other sensitive business data, BlackBerry says.
By Jai Vijayan Contributing Writer, 4/7/2020
Comment0 comments  |  Read  |  Post a Comment
Cybercriminals Hide Malware & Phishing Sites Under SSL Certificates
Kelly Sheridan, Staff Editor, Dark ReadingNews
More than half of the top 1 million websites use HTTPS, researchers report, but not all encrypted traffic is safe.
By Kelly Sheridan Staff Editor, Dark Reading, 4/7/2020
Comment0 comments  |  Read  |  Post a Comment
The Edge Names 'Holy Cow' Cartoon Caption Winners
Edge Editors, Dark Reading
What can cows possibly have to do with cybersecurity?
By Edge Editors Dark Reading, 4/7/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by jenkins8661
Current Conversations Digitized COVID-19 Prevention
In reply to: Caption
Post Your Own Reply
Posted by MagneticPortal
Current Conversations The dead do not laugh...
In reply to: Caption suggestion
Post Your Own Reply
More Conversations
PR Newswire
Security Now Joins Dark Reading

Find out more about the combination of two of the industry's leading cybersecurity news sites.

edge
Most enterprise endpoint solutions will support policies to enforce recommended updates.
Maybe security alert fatigue wouldn't be so bad if the alerts themselves delivered less stress and more aromatherapy.
Ransomware operators are aiming for bigger targets and hitting below the belt. With doxing and extortion threats added to the mix, ransomware is evolving into something even more sinister.
Register for Dark Reading Newsletters
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
White Papers
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18375
PUBLISHED: 2020-04-10
The ASG and ProxySG management consoles are susceptible to a session hijacking vulnerability. A remote attacker, with access to the appliance management interface, can hijack the session of a currently logged-in user and access the management console.
CVE-2019-18376
PUBLISHED: 2020-04-10
A CSRF token disclosure vulnerability allows a remote attacker, with access to an authenticated Management Center (MC) user's web browser history or a network device that intercepts/logs traffic to MC, to obtain CSRF tokens and use them to perform CSRF attacks against MC.
CVE-2019-7305
PUBLISHED: 2020-04-10
Information Exposure vulnerability in eXtplorer makes the /usr/ and /etc/extplorer/ system directories world-accessible over HTTP. Introduced in the Makefile patch file debian/patches/debian-changes-2.1.0b6+dfsg-1 or debian/patches/adds-a-makefile.patch, this can lead to data leakage, information di...
CVE-2020-8832
PUBLISHED: 2020-04-10
The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacke...
CVE-2020-1633
PUBLISHED: 2020-04-09
Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, lea...
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Flash Poll
Video
Slideshows
Twitter Feed