Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
8 Most Overlooked Security Threats
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
JackieHorn09
JackieHorn09,
User Rank: Apprentice
1/7/2019 | 9:16:51 PM
Newbie
I am a 33-year-old female, with no military affiliation just getting started with my bachelor's in cybersecurity.  Any thoughts or help to get started? Will my age and the fact that I have no prior military hurt me? 
EricT981
EricT981,
User Rank: Author
6/13/2017 | 2:57:17 PM
Re: Awareness training
It's easy to get excited about 0-days and network security because technology solutions are easier than human solutions. Education is important, but so is accountability: Security teams need to start bringing other teams (infrastructure, dev) into the fray.
stevejennings
stevejennings,
User Rank: Strategist
6/7/2017 | 9:00:53 AM
Re: Malvertising
64% of Americans work from home? Really? Perhaps you meant 64% of IT professionals? And even that sounds high.
ebyjeeby
ebyjeeby,
User Rank: Strategist
6/6/2017 | 2:04:45 PM
Re: 8 Most Overlooked Security Threats
z/OS and NSK are very secure, nothing like *nix and Windows.
tadwhitaker
tadwhitaker,
User Rank: Author
6/5/2017 | 2:48:12 PM
IOT
The threat of connected devices can't be overstated enough. It needs to be the next phishing, in terms of public awareness. Particularly as voice-activated assistants are widely adopted.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
6/2/2017 | 4:33:51 PM
Re: Awareness training
@Dr.T: I'm not even so sure about the "more than ever"... Hackers have long known that social engineering is where it's at.  And Kevin Mitnick taught us this through his own exploits back in the day.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
6/2/2017 | 4:32:13 PM
Re: Malvertising
@Dr.T: Incorrect. But most if not all video would be disabled. And then for the sites you explicitly trust, you could enable as needed.
ronbo1963
ronbo1963,
User Rank: Apprentice
5/31/2017 | 11:54:53 AM
Re: 8 Most Overlooked Security Threats
Spot on. I started my IT career working in a IBM Mainframe environment. The economy of scale of going back to that platform would be a tremendous benefit to any corporate enterprise. When the top 50 banks in the world rely on z/OS as their primary server environment what do they know that the rest of the corporate world do not....... P.S. 35 years IT. Also performed the Common Criteria Evaluation of two to the z/OS security filters. Much more robust and safe than other platform implementations.....
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
5/30/2017 | 4:39:24 PM
Re: Awareness training
This is the bigger issue in security: Creating a culture of security.  Having the best security systems in the world technologically do little good if people are just willing to hand over login information, click on links willy-nilly, and let strangers into their datacenters.
tcritchley07
tcritchley07,
User Rank: Moderator
5/30/2017 | 2:23:39 PM
Re: 8 Most Overlooked Security Threats
I'm afraid all OSes are not the same. Windows is a ramshackle lash-up which changes every version and is wide open to abuse. z/OS is far more robust and defendable than Windows and is capable of protecting Linux running under it. The 3rd party apps that run with Windows to give the total internet environment were not designed together and are bolt-ons with the same potential for interference with each other and by the bad guys. We all know that certain apps will not coexist on Windows and some have brought my system down before I uninstalled them.

PS I am not an apprentice but have nearly 50 years in IT as practitioner latterly as an author.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-42003
PUBLISHED: 2022-10-02
In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
CVE-2022-42004
PUBLISHED: 2022-10-02
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
CVE-2022-42002
PUBLISHED: 2022-10-01
SonicJS through 0.6.0 allows file overwrite. It has the following mutations that are used for updating files: fileCreate and fileUpdate. Both of these mutations can be called without any authentication to overwrite any files on a SonicJS application, leading to Arbitrary File Write and Delete.
CVE-2022-39268
PUBLISHED: 2022-09-30
### Impact In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end use...
CVE-2022-34428
PUBLISHED: 2022-09-30
Dell Hybrid Client prior to version 1.8 contains a Regular Expression Denial of Service Vulnerability in the UI. An adversary with WMS group admin access could potentially exploit this vulnerability, leading to temporary denial-of-service.