Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

News & Commentary
The 5 Love Languages of Cybersecurity
Fredrick Commentary
When it comes to building buy-in from the business, all cybersecurity needs is love -- especially when it comes to communication.
By Fredrick "Flee" Lee Chief Security Officer, Gusto, 2/14/2020
Comment0 comments  |  Read  |  Post a Comment
7 Tax Season Security Tips
Steve Zurier, Contributing Writer
Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.
By Steve Zurier Contributing Writer, 2/13/2020
Comment0 comments  |  Read  |  Post a Comment
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at KaseyaCommentary
There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team sleep better.
By Mike Puglia Chief Strategy Officer at Kaseya, 2/13/2020
Comment3 comments  |  Read  |  Post a Comment
Forget Hacks... Ransomware, Phishing Are Election Year's Real Threats
Tod Beardsley, Director of Research, Rapid7Commentary
As we gear up for the voting season, let's put aside any links between foreign interference and voting machine security and focus on the actual risks threatening election security.
By Tod Beardsley Director of Research, Rapid7, 2/13/2020
Comment0 comments  |  Read  |  Post a Comment
FBI: Business Email Compromise Cost Businesses $1.7B in 2019
Kelly Sheridan, Staff Editor, Dark ReadingNews
BEC attacks comprised nearly half of cybercrime losses last year, which totaled $3.5 billion overall as Internet-enabled crimes ramped up.
By Kelly Sheridan Staff Editor, Dark Reading, 2/12/2020
Comment0 comments  |  Read  |  Post a Comment
Stop Defending Everything
Kevin Kurzawa, Senior Information Security AuditorCommentary
Instead, try prioritizing with the aid of a thorough asset inventory.
By Kevin Kurzawa Senior Information Security Auditor, 2/12/2020
Comment3 comments  |  Read  |  Post a Comment
5 Common Errors That Allow Attackers to Go Undetected
Matt Middleton-Leal, General Manager and Chief Security Strategist, NetwrixCommentary
Make these mistakes and invaders might linger in your systems for years.
By Matt Middleton-Leal General Manager and Chief Security Strategist, Netwrix, 2/12/2020
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Patches Exploited Internet Explorer Flaw
Kelly Sheridan, Staff Editor, Dark ReadingNews
This month's Patch Tuesday brings fixes for 99 CVEs, including one IE flaw seen exploited in the wild.
By Kelly Sheridan Staff Editor, Dark Reading, 2/11/2020
Comment0 comments  |  Read  |  Post a Comment
Cybercriminals Swap Phishing for Credential Abuse, Vuln Exploits
Kelly Sheridan, Staff Editor, Dark ReadingNews
Infection vectors were evenly divided among phishing, vulnerability exploitation, and unauthorized credential use in 2019.
By Kelly Sheridan Staff Editor, Dark Reading, 2/11/2020
Comment0 comments  |  Read  |  Post a Comment
Keeping a Strong Security Metrics Framework Strong
Joshua Goldfarb, Independent ConsultantCommentary
Don't just report metrics -- analyze, understand, monitor, and adjust them. These 10 tips will show you how.
By Joshua Goldfarb Independent Consultant, 2/11/2020
Comment1 Comment  |  Read  |  Post a Comment
How North Korea's Senior Leaders Harness the Internet
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions.
By Kelly Sheridan Staff Editor, Dark Reading, 2/10/2020
Comment0 comments  |  Read  |  Post a Comment
Some Democrats Lead Trump in Campaign Domain-Security Efforts
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Sanders and Trump campaigns lack proper DMARC security enforcement, study finds.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/10/2020
Comment0 comments  |  Read  |  Post a Comment
Day in the Life of a Bot
Steve Winterfeld, Advisory CISO at AkamaiCommentary
A typical workday for a bot, from its own point of view.
By Steve Winterfeld Advisory CISO at Akamai, 2/10/2020
Comment0 comments  |  Read  |  Post a Comment
RobbinHood Kills Security Processes Before Dropping Ransomware
Kelly Sheridan, Staff Editor, Dark ReadingNews
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.
By Kelly Sheridan Staff Editor, Dark Reading, 2/7/2020
Comment0 comments  |  Read  |  Post a Comment
5 Measures to Harden Election Technology
Ari Singer, CTO at TrustPhiCommentary
Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable.
By Ari Singer CTO at TrustPhi, 2/7/2020
Comment3 comments  |  Read  |  Post a Comment
90% of CISOs Would Cut Pay for Better Work-Life Balance
Kelly Sheridan, Staff Editor, Dark ReadingNews
Businesses receive $30,000 of 'free' CISO time as security leaders report job-related stress taking a toll on their health and relationships.
By Kelly Sheridan Staff Editor, Dark Reading, 2/6/2020
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Vendor Landscape Transforming as Symantec, McAfee Enter New Eras
Eric Parizo, Senior Analyst, OvumCommentary
Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future.
By Eric Parizo Senior Analyst, Ovum, 2/6/2020
Comment0 comments  |  Read  |  Post a Comment
Facebook Tops Imitated Brands as Attackers Target Tech
Dark Reading Staff, Quick Hits
Brand impersonators favor Facebook, Yahoo, Network, and PayPal in phishing attempts to steal credentials from victims.
By Dark Reading Staff , 2/6/2020
Comment0 comments  |  Read  |  Post a Comment
How Can We Make Election Technology Secure?
Ari Singer, CTO at TrustPhiCommentary
In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.
By Ari Singer CTO at TrustPhi, 2/6/2020
Comment0 comments  |  Read  |  Post a Comment
Vixie: The Unintended Consequences of Internet Privacy Efforts
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Paul Vixie says emerging encryption protocols for endpoints could "break" security in enterprise - and even home - networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/5/2020
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by chirurgieesthetiqutunisie
Current Conversations wonderful article
In reply to: reading
Post Your Own Reply
More Conversations
PR Newswire
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9016
PUBLISHED: 2020-02-16
Dolibarr 11.0 allows XSS via the joinfiles, topic, or code parameter, or the HTTP Referer header.
CVE-2020-9013
PUBLISHED: 2020-02-16
Arvato Skillpipe 3.0 allows attackers to bypass intended print restrictions by deleting <div id="watermark"> from the HTML source code.
CVE-2020-9007
PUBLISHED: 2020-02-16
Codoforum 4.8.8 allows self-XSS via the title of a new topic.
CVE-2020-9012
PUBLISHED: 2020-02-16
A cross-site scripting (XSS) vulnerability in the Import People functionality in Gluu Identity Configuration 4.0 allows remote attackers to inject arbitrary web script or HTML via the filename parameter.
CVE-2019-20456
PUBLISHED: 2020-02-16
Goverlan Reach Console before 9.50, Goverlan Reach Server before 3.50, and Goverlan Client Agent before 9.20.50 have an Untrusted Search Path that leads to Command Injection and Local Privilege Escalation via DLL hijacking.