Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

News & Commentary
10 Notable Security Acquisitions of 2019 (So Far)
Kelly Sheridan, Staff Editor, Dark Reading
In a year when security companies have been snapped up left and right, these deals stand out from the chaos.
By Kelly Sheridan Staff Editor, Dark Reading, 6/15/2019
Comment0 comments  |  Read  |  Post a Comment
Congress Gives 'Hack Back' Legislation Another Try
Dark Reading Staff, Quick Hits
Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks.
By Dark Reading Staff , 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
The CISO's Drive to Consolidation
Nik Whitfield, Computer Scientist & Security Technology EntrepreneurCommentary
Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started.
By Nik Whitfield Computer Scientist & Security Technology Entrepreneur, 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
Google Adds Two-Factor Authentication For Its Apps on iOS
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Android-based two-factor authentication now works for Google applications on iPad and iPhone.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
CrowdStrike Prices IPO Above Range at $34
Kelly Sheridan, Staff Editor, Dark ReadingNews
The endpoint security firm raised $612 million ahead of today's public debut.
By Kelly Sheridan Staff Editor, Dark Reading, 6/12/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft Issues Fixes for 88 Vulnerabilities
Kelly Sheridan, Staff Editor, Dark ReadingNews
Four of the flaws are publicly known but none have been listed as under active attack.
By Kelly Sheridan Staff Editor, Dark Reading, 6/11/2019
Comment0 comments  |  Read  |  Post a Comment
Cognitive Bias Can Hamper Security Decisions
Kelly Sheridan, Staff Editor, Dark ReadingNews
A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes.
By Kelly Sheridan Staff Editor, Dark Reading, 6/10/2019
Comment1 Comment  |  Read  |  Post a Comment
GoldBrute Botnet Brute-Forcing 1.5M RDP Servers
Dark Reading Staff, Quick Hits
Botnets are scanning the Internet for servers exposing RDP and using weak, reused passwords to obtain access.
By Dark Reading Staff , 6/10/2019
Comment0 comments  |  Read  |  Post a Comment
Unmixed Messages: Bringing Security & Privacy Awareness Together
Tom Pendergast & Jeff Morgenroth, Chief Learning Officer at MediaPRO/Instructional Designer at MediaPROCommentary
Security and privacy share the same basic goals, so it just makes sense to combine efforts in those two areas. But that can be easier said than done.
By Tom Pendergast & Jeff Morgenroth Chief Learning Officer at MediaPRO/Instructional Designer at MediaPRO, 6/10/2019
Comment0 comments  |  Read  |  Post a Comment
End User Lockdown: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
Phishing, cybersecurity training, biometrics and casual Fridays. And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 6/7/2019
Comment2 comments  |  Read  |  Post a Comment
The Minefield of Corporate Email
Kelly Sheridan, Staff Editor, Dark ReadingNews
Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.
By Kelly Sheridan Staff Editor, Dark Reading, 6/7/2019
Comment3 comments  |  Read  |  Post a Comment
6 Security Scams Set to Sweep This Summer
Kelly Sheridan, Staff Editor, Dark Reading
Experts share the cybersecurity threats to watch for and advice to stay protected.
By Kelly Sheridan Staff Editor, Dark Reading, 6/6/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Finds Thousands of iOS Apps Ignoring Security
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A critical data encryption tool, included by default in iOS, is being turned off in more than two-thirds of popular apps.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/5/2019
Comment1 Comment  |  Read  |  Post a Comment
SentinelOne Raises $120M in Series D Funding
Dark Reading Staff, Quick Hits
The endpoint security company already has specific plans for the new funds.
By Dark Reading Staff , 6/5/2019
Comment0 comments  |  Read  |  Post a Comment
How to Get the Most Benefits from Biometrics
Bojan Simic, Chief Technology Officer & Co-Founder of HYPRCommentary
Providing an easy-to-use, uniform authentication experience without passwords is simpler than you may think.
By Bojan Simic Chief Technology Officer & Co-Founder of HYPR, 6/5/2019
Comment2 comments  |  Read  |  Post a Comment
How Today's Cybercriminals Sneak into Your Inbox
Kelly Sheridan, Staff Editor, Dark ReadingNews
The tactics and techniques most commonly used to slip past security defenses and catch employees off guard.
By Kelly Sheridan Staff Editor, Dark Reading, 6/4/2019
Comment2 comments  |  Read  |  Post a Comment
Why FedRAMP Matters to Non-Federal Organizations
Daniel P. Kent, Director, Public Sector Engineering & CTO, Cisco SystemsCommentary
Commercial companies should explore how FedRAMP can help mitigate risk as they move to the cloud.
By Daniel P. Kent Director, Public Sector Engineering & CTO, Cisco Systems, 6/4/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft Urges Businesses to Patch 'BlueKeep' Flaw
Kelly Sheridan, Staff Editor, Dark ReadingNews
Fearing another worm of WannaCry severity, Microsoft warns vulnerable users to apply the software update for CVE-2019-0708.
By Kelly Sheridan Staff Editor, Dark Reading, 6/3/2019
Comment1 Comment  |  Read  |  Post a Comment
Certifiably Distracted: The Economics of Cybersecurity
Dan Didier, VP of Services, GreyCastle SecurityCommentary
Is cybersecurity worth the investment? It depends.
By Dan Didier VP of Services, GreyCastle Security, 6/3/2019
Comment1 Comment  |  Read  |  Post a Comment
GDPRs First-Year Impact By the Numbers
Ericka Chickowski, Contributing Writer
The latest statistics on GDPR spending, compliance rates, enforcement and consumer attitudes on privacy protection.
By Ericka Chickowski Contributing Writer, 5/31/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Cognitive Bias Can Hamper Security Decisions
Kelly Sheridan, Staff Editor, Dark Reading,  6/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7472
PUBLISHED: 2019-06-15
The "Count per Day" plugin before 3.2.6 for WordPress allows XSS via the wp-admin/?page=cpd_metaboxes daytoshow parameter.
CVE-2019-12839
PUBLISHED: 2019-06-15
In OrangeHRM 4.3.1 and before, there is an input validation error within admin/listMailConfiguration (txtSendmailPath parameter) that allows authenticated attackers to achieve arbitrary command execution.
CVE-2019-12840
PUBLISHED: 2019-06-15
In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.
CVE-2019-12835
PUBLISHED: 2019-06-15
formats/xml.cpp in Leanify 0.4.3 allows for a controlled out-of-bounds write in xml_memory_writer::write via characters that require escaping.
CVE-2019-12830
PUBLISHED: 2019-06-15
In MyBB before 1.8.21, an attacker can exploit a parsing flaw in the Private Message / Post renderer that leads to [video] BBCode persistent XSS to take over any forum account, aka a nested video MyCode issue.