Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

News & Commentary
Bank of America Security Incident Affects PPP Applicants
Dark Reading Staff, Quick Hits
The incident occurred when Paycheck Protection Program applications were uploaded to a test platform and accidentally shared.
By Dark Reading Staff , 5/29/2020
Comment0 comments  |  Read  |  Post a Comment
All Links Are Safe ... Right?
Beyond the Edge, Dark Reading
Today is a perfect day for a security breach.
By Beyond the Edge Dark Reading, 5/29/2020
Comment0 comments  |  Read  |  Post a Comment
Google, Microsoft Brands Impersonated the Most in Form-Based Attacks
Steve Zurier, Contributing WriterNews
Attackers are preying on users' inclination to click on familiar-looking websites, but instead trick them into sharing usernames and passwords.
By Steve Zurier Contributing Writer, 5/28/2020
Comment0 comments  |  Read  |  Post a Comment
Standing Privilege: The Attacker's Advantage
Tim Keeler, Founder and CEO, RemediantCommentary
The credential is a commodity and will continue to be breached. As a result, focus and spending must shift toward the access that the credentials provide.
By Tim Keeler Founder and CEO, Remediant, 5/27/2020
Comment0 comments  |  Read  |  Post a Comment
GDPR Enforcement Loosens Amid Pandemic
Seth Rosenblatt, Contributing WriterNews
The European Union has given some organizations more breathing room to remedy violations, yet no one should think regulators are planning to abandon the privacy legislation in the face of COVID-19.
By Seth Rosenblatt Contributing Writer, 5/27/2020
Comment3 comments  |  Read  |  Post a Comment
Microsoft Shares PonyFinal Threat Data, Warns of Delivery Tactics
Kelly Sheridan, Staff Editor, Dark ReadingNews
PonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.
By Kelly Sheridan Staff Editor, Dark Reading, 5/27/2020
Comment0 comments  |  Read  |  Post a Comment
6 Steps Consumers Should Take Following a Hack
Steve Zurier, Contributing Writer
Without the luxury of an IT security team to help them after a breach or credit card compromise, consumers will want to keep these tips in mind.
By Steve Zurier Contributing Writer, 5/27/2020
Comment0 comments  |  Read  |  Post a Comment
StrandHogg 2.0 Emerges as 'Evil Twin' to Android Threat
Kelly Sheridan, Staff Editor, Dark ReadingNews
The vulnerability, which exists in almost every version of Android, is both more dangerous and harder to detect than its predecessor.
By Kelly Sheridan Staff Editor, Dark Reading, 5/26/2020
Comment0 comments  |  Read  |  Post a Comment
Americans Care About Security But Don't Follow Through
Dark Reading Staff, Quick Hits
Most Americans say they're very concerned about online security but still behave in insecure ways, according to a new survey.
By Dark Reading Staff , 5/26/2020
Comment0 comments  |  Read  |  Post a Comment
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading
Mobile security experts share their go-to advice for protecting iPhones from hackers, thieves, and fraudsters.
By Kelly Sheridan Staff Editor, Dark Reading, 5/22/2020
Comment2 comments  |  Read  |  Post a Comment
The Need for Compliance in a Post-COVID-19 World
Baan Alsinawi, Founder and Managing Director at TalaTekCommentary
With the current upheaval, business leaders may lose focus and push off implementing security measures, managing risk, and keeping up with compliance requirements. That's a big mistake.
By Baan Alsinawi Founder and Managing Director at TalaTek, 5/21/2020
Comment0 comments  |  Read  |  Post a Comment
60% of Insider Threats Involve Employees Planning to Leave
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers shows most "flight-risk" employees planning to leave an organization tend to start stealing data two to eight weeks before they go.
By Kelly Sheridan Staff Editor, Dark Reading, 5/20/2020
Comment0 comments  |  Read  |  Post a Comment
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management StrategistCommentary
Enterprises need to recognize that remote access and other pandemic-related security challenges cannot be fixed with buzzwords or silver-bullet security tools.
By Dan Blum Cybersecurity & Risk Management Strategist, 5/20/2020
Comment1 Comment  |  Read  |  Post a Comment
Google Chrome Redesign Puts Security & Privacy in Users' Hands
Dark Reading Staff, Quick Hits
The Chrome browser will tell users if their browser is up to date, malicious extensions are installed, and/or a password has been compromised.
By Dark Reading Staff , 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
Web Application Attacks Double from 2019: Verizon DBIR
Kelly Sheridan, Staff Editor, Dark ReadingNews
Verizon's annual data breach report shows most attackers are external, money remains their top motivator, and web applications and unsecured cloud storage are hot targets.
By Kelly Sheridan Staff Editor, Dark Reading, 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
Long-Term Remote Work: Keeping Workers Productive & Secure
Joe Payne, President and CEO at Code42Commentary
The pandemic has changed how we get work done. Now, data security must catch up.
By Joe Payne President and CEO at Code42, 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Extends Far Beyond Security Teams & Everyone Plays a Part
Jim Ivers, VP within the Synopsys Software Integrity GroupCommentary
Security isn't about tools or technology; it's about establishing a broad, fundamental awareness and sense of responsibility among all employees.
By Jim Ivers VP within the Synopsys Software Integrity Group, 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
Private Equity Firm Stalls $1.9B Forescout Acquisition
Dark Reading Staff, Quick Hits
Officials say "there can be no assurance" Forescout and Advent International will reach an agreement, though talks are ongoing.
By Dark Reading Staff , 5/18/2020
Comment0 comments  |  Read  |  Post a Comment
The 3 Top Cybersecurity Myths & What You Should Know
Zack Schuler, Founder and CEO of NINJIOCommentary
With millions of employees now attempting to work from home, it's vital to challenge misconceptions about cybersecurity.
By Zack Schuler Founder and CEO of NINJIO, 5/18/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Open Sources Its Coronavirus Threat Data
Dark Reading Staff, Quick Hits
Microsoft's COVID-19 intelligence will be made publicly available to help businesses fight virus-related security threats.
By Dark Reading Staff , 5/15/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by bina
Current Conversations Can you smell me now?
In reply to: Hey,
Post Your Own Reply
Posted by robeena
Current Conversations thanks for shering     
In reply to: thanks
Post Your Own Reply
More Conversations
PR Newswire
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5334
PUBLISHED: 2020-06-01
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-5335
PUBLISHED: 2020-06-01
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-5336
PUBLISHED: 2020-06-01
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-5337
PUBLISHED: 2020-06-01
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
CVE-2019-5409
PUBLISHED: 2020-06-01
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.