Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

9 Tips to Prepare for the Future of Cloud & Network Security
12 Bare-Minimum Benchmarks for AppSec Initiatives
A Hacker's Playlist
The Threat from the Internet--and What Your Organization Can Do About It
COVID-19: Latest Security News & Commentary
News & Commentary
The No Good, Very Bad Week for Iran's Nation-State Hacking Ops
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A look at the state of Iran's cyber operations as the US puts the squeeze on it with a pile of indictments and sanctions.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/30/2020
Comment0 comments  |  Read  |  Post a Comment
GitHub Tool Spots Security Vulnerabilities in Code
Jai Vijayan, Contributing WriterNews
Scanner, which just became generally available, lets developers spot problems before code gets into production.
By Jai Vijayan Contributing Writer, 9/30/2020
Comment0 comments  |  Read  |  Post a Comment
Cloud Misconfiguration Mishaps Businesses Must Watch
Kelly Sheridan, Staff Editor, Dark ReadingNews
Cloud security experts explain which misconfigurations are most common and highlight other areas of the cloud likely to threaten businesses.
By Kelly Sheridan Staff Editor, Dark Reading, 9/30/2020
Comment0 comments  |  Read  |  Post a Comment
What Legal Language Should I Look Out for When Selecting Cyber Insurance?
Edge Editors, Dark Reading
At times, vague coverage can actually work for you.
By Edge Editors Dark Reading, 9/30/2020
Comment0 comments  |  Read  |  Post a Comment
A Guide to the NIST Cybersecurity Framework
IFSEC Global, StaffNews
With cybersecurity threats growing exponentially, it has never been more important to put together an efficient cyber-risk management policy, and NIST's framework can help.
By By Julian Hall, Freelance Journalist and Copywriter, Textual Healing , 9/30/2020
Comment0 comments  |  Read  |  Post a Comment
COVID-19 Creates Opening for OT Security Reform
John Livingston,  CEO of Verve Industrial ProtectionCommentary
Operations technology was once considered low risk, at least until the virus came along and re-arranged the threat landscape.
By John Livingston CEO of Verve Industrial Protection, 9/30/2020
Comment0 comments  |  Read  |  Post a Comment
Phishing Attack Targets Microsoft 365 Users With Netflix & Amazon Lures
Dark Reading Staff, Quick Hits
Cyberattacker TA2552 primarily targets Spanish speakers with messages that leverage a narrow range of themes and popular brands.
By Dark Reading Staff , 9/30/2020
Comment0 comments  |  Read  |  Post a Comment
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of LumuCommentary
How to bolster security defenses by zeroing in on the length of time an interloper remains undetected inside your network.
By Ricardo Villadiego Founder and CEO of Lumu, 9/30/2020
Comment2 comments  |  Read  |  Post a Comment
Microsoft: Ransomware & Nation-State Attacks Rise, Get More Sophisticated
Robert Lemos, Contributing WriterNews
Malware-based attacks are out, phishing is in, along with credential stuffing and business email compromise. Microsoft recommends defensive tactics in its new report on rising threats.
By Robert Lemos Contributing Writer, 9/29/2020
Comment0 comments  |  Read  |  Post a Comment
DDoS Attacks Soar in First Half of 2020
Dark Reading Staff, Quick Hits
Shorter, faster, multivector attacks had a greater impact on victims.
By Dark Reading Staff , 9/29/2020
Comment0 comments  |  Read  |  Post a Comment
New Campaign by China-Linked Group Targets US Orgs for First Time
Jai Vijayan, Contributing WriterNews
In a least one instance, the Palmerworm APT group was able to remain undetected on a compromised system for nearly six months, according to Symantec.
By Jai Vijayan Contributing Writer, 9/29/2020
Comment0 comments  |  Read  |  Post a Comment
Securing Slack: 5 Tips for Safer Messaging, Collaboration
Pam Baker, Contributing Writer
Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure when using Slack.
By Pam Baker Contributing Writer, 9/29/2020
Comment0 comments  |  Read  |  Post a Comment
Vulnerability in Wireless Router Chipsets Prompts Advisory
Dark Reading Staff, Quick Hits
Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek.
By Dark Reading Staff , 9/29/2020
Comment0 comments  |  Read  |  Post a Comment
Shifting Left of Left: Why Secure Code Isn't Always Quality Code
Matias Madou, CTO and co-founder, Secure Code WarriorCommentary
Enabling engineers to share responsibility for security and empowering them to erase common vulnerabilities are good starting points.
By Matias Madou CTO and co-founder, Secure Code Warrior, 9/29/2020
Comment0 comments  |  Read  |  Post a Comment
State-Sponsored Hacking Groups Increasingly Use Cloud & Open Source Infrastructure
Robert Lemos, Contributing WriterNews
Microsoft shuts down Azure Active Directory instances used by attackers to evade detection and warns that the use of open source tools by espionage groups is growing.
By Robert Lemos Contributing Writer, 9/29/2020
Comment0 comments  |  Read  |  Post a Comment
The Shared Irresponsibility Model in the Cloud Is Putting You at Risk
Dan Hubbard, CEO at LaceworkCommentary
Step up, put the architecture and organization in place, and take responsibility. If you don't, who will?
By Dan Hubbard CEO at Lacework, 9/29/2020
Comment0 comments  |  Read  |  Post a Comment
Ivanti Acquires Two Security Companies
Dark Reading Staff, Quick Hits
Purchase of MobileIron and Pulse Secure announced simultaneously.
By Dark Reading Staff , 9/28/2020
Comment0 comments  |  Read  |  Post a Comment
Universal Health Services Network Down in Apparent Ransomware Attack
Dark Reading Staff, Quick Hits
UHS reportedly hit with ransomware that took down its network that supports hundreds of healthcare facilities and hospitals.
By Dark Reading Staff , 9/28/2020
Comment0 comments  |  Read  |  Post a Comment
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading
Cloud and network security analysts outline trends and priorities businesses should keep top of mind as they grow more reliant on cloud.
By Kelly Sheridan Staff Editor, Dark Reading, 9/28/2020
Comment3 comments  |  Read  |  Post a Comment
Safeguarding Schools Against RDP-Based Ransomware
James Lui, Ericom Group CTO, AmericasCommentary
How getting online learning right today will protect schools, and the communities they serve, for years to come.
By James Lui Ericom Group CTO, Americas, 9/28/2020
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by JohnHammond
Current Conversations Nice article!
In reply to: Great!
Post Your Own Reply
More Conversations
PR Newswire
Security Now Joins Dark Reading

Find out more about the combination of two of the industry's leading cybersecurity news sites.

At times, vague coverage can actually work for you.
Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure when using Slack.
The dream of RASP is to empower applications to protect themselves. How close do current implementations get to living the dream? Here's what to know.
Register for Dark Reading Newsletters
Cartoon
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20902
PUBLISHED: 2020-10-01
Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1.
CVE-2019-20903
PUBLISHED: 2020-10-01
The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.
CVE-2020-25288
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
CVE-2020-25781
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
CVE-2020-25830
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Flash Poll
Video
Slideshows
Twitter Feed