Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

News & Commentary
Vulnerability Volume Poised to Overwhelm Infosec Teams
Kelly Sheridan, Staff Editor, Dark ReadingNews
The collision of Microsoft and Oracle patches on the same day has contributed to risk and stress for organizations.
By Kelly Sheridan Staff Editor, Dark Reading, 8/27/2020
Comment0 comments  |  Read  |  Post a Comment
COVID-19: Latest Security News & Commentary
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
By Dark Reading Staff , 8/27/2020
Comment20 comments  |  Read  |  Post a Comment
Higher Education CISOs Share COVID-19 Response Stories
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security leaders from Stanford, Ohio State, and the University of Chicago share challenges and response tactics from the COVID-19 pandemic.
By Kelly Sheridan Staff Editor, Dark Reading, 8/26/2020
Comment0 comments  |  Read  |  Post a Comment
US Warns of Ongoing BeagleBoyz Bank-Theft Operations
Dark Reading Staff, Quick Hits
The North Korean operatives have attempted to steal more than $2 billion since 2015 in a series of ongoing campaigns.
By Dark Reading Staff , 8/26/2020
Comment0 comments  |  Read  |  Post a Comment
6 Signs Your Supply Chain Risk Just Shot Up
Curtis Franklin Jr., Senior Editor at Dark Reading
Risk levels are not steady states. Here are six indications that the danger posed by your supply chain is headed in the wrong direction.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/26/2020
Comment0 comments  |  Read  |  Post a Comment
Deep Fake: Setting the Stage for Next-Gen Social Engineering
Jon Mendoza, CISO, TechnologentCommentary
Humans are susceptible to normalcy bias, which may leave us vulnerable to disinformation that reinforces our beliefs.
By Jon Mendoza CISO, Technologent, 8/26/2020
Comment0 comments  |  Read  |  Post a Comment
Three Easy Ways to Avoid Meow-like Database Attacks
Ron Bennatan, Co-founder & CTO of jSonarCommentary
The largest problem facing database security today is the disconnect between security teams and DBAs beginning from the moment of configuration and continuing throughout the database lifecycle.
By Ron Bennatan Co-founder & CTO of jSonar, 8/25/2020
Comment0 comments  |  Read  |  Post a Comment
Palo Alto Networks to Acquire The Crypsis Group for $265M
Dark Reading Staff, Quick Hits
This is the latest in a series of acquisitions that Palo Alto has made since 2018.
By Dark Reading Staff , 8/25/2020
Comment0 comments  |  Read  |  Post a Comment
The Fatal Flaw in Data Security
Ayal Yogev, CEO & Cofounder, AnjunaCommentary
Simply stated: No matter how sophisticated your security software is, data cannot be simultaneously used and secured. But that may be changing soon.
By Ayal Yogev CEO & Cofounder, Anjuna, 8/25/2020
Comment0 comments  |  Read  |  Post a Comment
CISA Releases 5G Security Guidelines
Dark Reading Staff, Quick Hits
The new document defines lines of effort for developing security for the growing 5G network.
By Dark Reading Staff , 8/24/2020
Comment0 comments  |  Read  |  Post a Comment
DeathStalker APT Targets SMBs with Cyber Espionage
Dark Reading Staff, Quick Hits
The hacker-for-hire group, operating since at least 2012, primarily targets financial firms.
By Dark Reading Staff , 8/24/2020
Comment0 comments  |  Read  |  Post a Comment
74 Days From the Presidential Election, Security Worries Mount
Robert Lemos, Contributing WriterNews
With pandemic measures continuing and political divisions deepening, security experts express concern about the security and integrity of the November election.
By Robert Lemos Contributing Writer, 8/21/2020
Comment1 Comment  |  Read  |  Post a Comment
'Next-Gen' Supply Chain Attacks Surge 430%
Ericka Chickowski, Contributing WriterNews
Attackers are increasingly seeding open source projects with compromised components.
By Ericka Chickowski Contributing Writer, 8/21/2020
Comment0 comments  |  Read  |  Post a Comment
Post-Pandemic Digitalization: Building a Human-Centric Cybersecurity Strategy
Nasser Al-Nasser & Dr. Guy Diedrich, Chair of the B20 Digitalization Taskforce and CEO of Saudi Telecom Company / Co-Chair of the B20 Digitalization Taskforce and Vice President and Global Innovation Officer of Cisco SystemsCommentary
COVID-19 won't be the last major disruption of its kind. Instead, it is a glimpse into what may be to come as digitalization continues to affect all aspects of our lives.
By Nasser Al-Nasser & Dr. Guy Diedrich Chair of the B20 Digitalization Taskforce and CEO of Saudi Telecom Company / Co-Chair of the B20 Digitalization Taskforce and Vice President and Global Innovation Officer of Cisco Systems, 8/21/2020
Comment0 comments  |  Read  |  Post a Comment
Cryptominer Found Embedded in AWS Community AMI
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers advise Amazon Web Services users running Community Amazon Machine Images to verify them for potentially malicious code.
By Kelly Sheridan Staff Editor, Dark Reading, 8/21/2020
Comment0 comments  |  Read  |  Post a Comment
Smart-Lock Hacks Point to Larger IoT Problems
Nicole Ferraro, Contributing WriterNews
Two recent reports on smart-locks vulnerabilities show that IoT vendors have a bigger job to do in ensuring their products are safely deployed and configured.
By Nicole Ferraro Contributing Writer, 8/20/2020
Comment1 Comment  |  Read  |  Post a Comment
Twitter Hack: The Spotlight that Insider Threats Need
Shareth Ben, Executive Director, Field Engineering, SecuronixCommentary
The high profile attack should spur serious board-level conversations around the importance of insider threat prevention.
By Shareth Ben Executive Director, Field Engineering, Securonix, 8/20/2020
Comment2 comments  |  Read  |  Post a Comment
Black Hat USA 2020 Recap: Experts Discuss Election Security Questions, but Offer Few Answers
Don Tait, Senior Analyst, OmdiaCommentary
The U.S. election in November is once again expected to be a target of digital adversaries. Experts at Black Hat USA 2020 highlighted the many election security questions authorities must address.
By Don Tait Senior Analyst, Omdia, 8/20/2020
Comment0 comments  |  Read  |  Post a Comment
Banks and the New Abnormal
Matt Deres, SVP, Chief Information Officer, Rocket SoftwareCommentary
Banks have hesitated to adopt many strong security practices, and for understandable reasons. But now is the time to be bold.
By Matt Deres SVP, Chief Information Officer, Rocket Software, 8/20/2020
Comment2 comments  |  Read  |  Post a Comment
Newly Patched Alexa Flaws a Red Flag for Home Workers
Steve Zurier, Contributing WriterNews
Alexa could serve as an entry point to home and corporate networks. Security experts point to the need for manufacturers to work closely with enterprise security teams to spot and shut down IoT device flaws.
By Steve Zurier Contributing Writer, 8/19/2020
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Wnahingr
Current Conversations Coooool
In reply to: -
Post Your Own Reply
Posted by Theallove
Current Conversations Good post, thanks!!
In reply to: best
Post Your Own Reply
More Conversations
PR Newswire
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/27/2020
The Inside Threat from Psychological Manipulators
Joshua Goldfarb, Independent Consultant,  8/27/2020
74 Days From the Presidential Election, Security Worries Mount
Robert Lemos, Contributing Writer,  8/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15601
PUBLISHED: 2020-08-27
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Deep Security 10.x-12.x could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication prevents this attack....
CVE-2020-15605
PUBLISHED: 2020-08-27
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Vulnerability Protection 2.0 SP2 could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication prevents thi...
CVE-2020-8602
PUBLISHED: 2020-08-27
A vulnerability in the management consoles of Trend Micro Deep Security 10.0-12.0 and Trend Micro Vulnerability Protection 2.0 SP2 may allow an authenticated attacker with full control privileges to bypass file integrity checks, leading to remote code execution.
CVE-2020-24618
PUBLISHED: 2020-08-27
In JetBrains YouTrack versions before 2020.3.4313, 2020.2.11008, 2020.1.11011, 2019.1.65514, 2019.2.65515, and 2019.3.65516, an attacker can retrieve an issue description without appropriate access.
CVE-2020-24717
PUBLISHED: 2020-08-27
OpenZFS before 2.0.0-rc1, when used on FreeBSD, misinterprets group permissions as user permissions, as demonstrated by mode 0770 being equivalent to mode 0777.