Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

News & Commentary
60% of Insider Threats Involve Employees Planning to Leave
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers shows most "flight-risk" employees planning to leave an organization tend to start stealing data two to eight weeks before they go.
By Kelly Sheridan Staff Editor, Dark Reading, 5/20/2020
Comment0 comments  |  Read  |  Post a Comment
Offers to Sell Enterprise Network Access Surge on Dark Web
Dark Reading Staff, Quick Hits
In contrast, Q1 2019 saw more interest in selling and buying access to individual servers.
By Dark Reading Staff , 5/20/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Warns of Vulnerability Affecting Windows DNS Server
Dark Reading Staff, Quick Hits
A new security advisory addresses a vulnerability that could be exploited to cause a denial-of-service attack.
By Dark Reading Staff , 5/20/2020
Comment0 comments  |  Read  |  Post a Comment
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management StrategistCommentary
Enterprises need to recognize that remote access and other pandemic-related security challenges cannot be fixed with buzzwords or silver-bullet security tools.
By Dan Blum Cybersecurity & Risk Management Strategist, 5/20/2020
Comment1 Comment  |  Read  |  Post a Comment
The 3 Top Cybersecurity Myths & What You Should Know
Zack Schuler, Founder and CEO of NINJIOCommentary
With millions of employees now attempting to work from home, it's vital to challenge misconceptions about cybersecurity.
By Zack Schuler Founder and CEO of NINJIO, 5/18/2020
Comment0 comments  |  Read  |  Post a Comment
Ensuring Business Continuity in Times of Crisis
Joan Pepin, CSO, Auth0Commentary
Three basic but comprehensive steps can help you and your organization get through adversity
By Joan Pepin CSO, Auth0, 5/14/2020
Comment0 comments  |  Read  |  Post a Comment
New Cyber-Espionage Framework Dubbed Ramsay
Kelly Sheridan, Staff Editor, Dark ReadingNews
The framework is designed to collect and exfiltrate sensitive documents from air-gapped networks.
By Kelly Sheridan Staff Editor, Dark Reading, 5/13/2020
Comment0 comments  |  Read  |  Post a Comment
CyberArk Acquires Idaptive for Identity-as-a-Service Tech
Dark Reading Staff, Quick Hits
The $70 million deal is intended to help CyberArk strengthen its portfolio with secure and SaaS-based identity management.
By Dark Reading Staff , 5/13/2020
Comment0 comments  |  Read  |  Post a Comment
More Tips for Staying Safe While Working from Home
Andrew Weaver, Director, Information Security, Park Place TechnologiesCommentary
While some users are up to speed with the WFH protocol, it's worth adding a few more items to your security checklist.
By Andrew Weaver Director, Information Security, Park Place Technologies, 5/13/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Fixes 111 Vulnerabilities for Patch Tuesday
Kelly Sheridan, Staff Editor, Dark ReadingNews
This marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical.
By Kelly Sheridan Staff Editor, Dark Reading, 5/12/2020
Comment0 comments  |  Read  |  Post a Comment
A-List Celebrity Law Firm Confirms Cyberattack
Dark Reading Staff, Quick Hits
Attackers claim to steal 756GB of data from Grubman Shire Meiselas & Sacks, which includes Madonna and Lady Gaga among its clients.
By Dark Reading Staff , 5/12/2020
Comment0 comments  |  Read  |  Post a Comment
Coronavirus, Data Privacy & the New Online Social Contract
Shuman Ghosemajumder, Global Head of Artificial Intelligence, F5 NetworksCommentary
How governments can protect personal privacy in contact tracing while saving peoples' lives
By Shuman Ghosemajumder Global Head of Artificial Intelligence, F5 Networks, 5/12/2020
Comment0 comments  |  Read  |  Post a Comment
As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints
Robert Lemos, Contributing WriterNews
A majority of firms expect to keep more employees working remotely post-pandemic, forcing businesses to undertake more comprehensive digital and cloud transformations.
By Robert Lemos Contributing Writer, 5/8/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Identity VP Shares How and Why to Ditch Passwords
Kelly Sheridan, Staff Editor, Dark ReadingNews
Passwords are on their way out, says Joy Chik, who offers guidance for businesses hoping to shift away from them.
By Kelly Sheridan Staff Editor, Dark Reading, 5/7/2020
Comment1 Comment  |  Read  |  Post a Comment
Maze Ransomware Operators Step Up Their Game
Kelly Sheridan, Staff Editor, Dark ReadingNews
Investigations show Maze ransomware operators leave "nothing to chance" when putting pressure on victims to pay.
By Kelly Sheridan Staff Editor, Dark Reading, 5/6/2020
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Reportedly in Talks to Acquire CyberX
Dark Reading Staff, Quick Hits
CyberX was founded in 2013 and has raised $48 million to build its cybersecurity platform for IoT and industrial control systems.
By Dark Reading Staff , 5/6/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Challenges Security Researchers to Hack Azure Sphere
Kelly Sheridan, Staff Editor, Dark ReadingNews
Participants can earn up to $100,000 for finding severe flaws in Microsoft's Linux-based Azure Sphere IoT operating system.
By Kelly Sheridan Staff Editor, Dark Reading, 5/5/2020
Comment1 Comment  |  Read  |  Post a Comment
Attackers Adapt Techniques to Pandemic Reality
Robert Lemos, Contributing WriterNews
Over the past several months, threat actors have quickly shifted their tactics to take advantage of interest in the coronavirus, two studies find.
By Robert Lemos Contributing Writer, 5/5/2020
Comment0 comments  |  Read  |  Post a Comment
SMB Security Catches Up to Large Companies, Data Shows
Kelly Sheridan, Staff Editor, Dark ReadingNews
Small and midsize businesses face issues similar to those of large organizations and have updated security practices to respond with threat hunting, patch management, and dedicated personnel.
By Kelly Sheridan Staff Editor, Dark Reading, 5/4/2020
Comment1 Comment  |  Read  |  Post a Comment
Zoom Installers Used to Spread WebMonitor RAT
Dark Reading Staff, Quick Hits
Researchers warn the installers are legitimate but don't come from official sources of the Zoom app, including the Apple App Store and Google Play.
By Dark Reading Staff , 5/4/2020
Comment4 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by ArcherPatten
Current Conversations i hope so
In reply to: Re: Thanks
Post Your Own Reply
More Conversations
PR Newswire
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5537
PUBLISHED: 2020-05-25
Cybozu Desktop for Windows 2.0.23 to 2.2.40 allows remote code execution via unspecified vectors.
CVE-2020-13438
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has an invalid read in jfif_encode in jfif.c.
CVE-2020-13439
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has a heap-based buffer over-read in jfif_decode in jfif.c.
CVE-2020-13440
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has an invalid write in bmp_load in bmp.c.
CVE-2020-13433
PUBLISHED: 2020-05-24
Jason2605 AdminPanel 4.0 allows SQL Injection via the editPlayer.php hidden parameter.