Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

News & Commentary
Snowden Sued by US Government Over His New Book
Dark Reading Staff, Quick Hits
Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.
By Dark Reading Staff , 9/17/2019
Comment0 comments  |  Read  |  Post a Comment
419M Facebook User Phone Numbers Publicly Exposed
Dark Reading Staff, Quick Hits
It's still unclear who owned the server storing hundreds of millions of records online without a password.
By Dark Reading Staff , 9/5/2019
Comment1 Comment  |  Read  |  Post a Comment
Splunk Buys Microservices Monitoring Firm Omnition
Dark Reading Staff, Quick Hits
The purchase is intended to boost Splunk's capabilities in microservices architectures.
By Dark Reading Staff , 9/4/2019
Comment0 comments  |  Read  |  Post a Comment
7 Steps to Web App Security
Steve Zurier, Contributing Writer
Emerging technologies are introducing entirely new ways to reach, act, and interact with people. That makes app security more important than ever.
By Steve Zurier Contributing Writer, 9/3/2019
Comment1 Comment  |  Read  |  Post a Comment
Overburdened SOC Analysts Shift Priorities
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/30/2019
Comment1 Comment  |  Read  |  Post a Comment
Retadup Worm Squashed After Infecting 850K Machines
Kelly Sheridan, Staff Editor, Dark ReadingNews
An operation involving French law enforcement, the FBI, and Avast forces Retadup to delete itself from victim machines.
By Kelly Sheridan Staff Editor, Dark Reading, 8/29/2019
Comment1 Comment  |  Read  |  Post a Comment
Magecart Shops for Victims as E-Commerce Market Grows
Kelly Sheridan, Staff Editor, Dark ReadingNews
In 2.5 hours of research, one security expert uncovered more than 80 actively compromised ecommerce websites.
By Kelly Sheridan Staff Editor, Dark Reading, 8/28/2019
Comment1 Comment  |  Read  |  Post a Comment
6 Ways Airlines and Hotels Can Keep Their Networks Secure
Steve Zurier, Contributing Writer
As recent news can attest, travel and hospitality companies are prime targets for cybercriminals. Here are six privacy and security tips that can help lock down privacy and security.
By Steve Zurier Contributing Writer, 8/27/2019
Comment0 comments  |  Read  |  Post a Comment
10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills
Curtis Franklin Jr., Senior Editor at Dark Reading
The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security without busting any budgets.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/23/2019
Comment0 comments  |  Read  |  Post a Comment
Stronger Defenses Force Cybercriminals to Rethink Strategy
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers see the rise of new relationships and attack techniques as criminals put companies' resilience to the test.
By Kelly Sheridan Staff Editor, Dark Reading, 8/14/2019
Comment0 comments  |  Read  |  Post a Comment
Internet Routing Security Initiative Launches Online 'Observatory'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Mutually Agreed Norms for Routing Security (MANRS) lets network operators and the public view online router incidents worldwide.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/13/2019
Comment1 Comment  |  Read  |  Post a Comment
FBI Plans to Monitor Social Media May Spark Privacy Issues
Dark Reading Staff, Quick Hits
A new initiative to pull data from social media platforms may clash with policies prohibiting the use of information for mass surveillance.
By Dark Reading Staff , 8/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2019
Sara Peters, Senior Editor at Dark ReadingNews
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
By Sara Peters Senior Editor at Dark Reading, 8/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Buttigieg Campaign Adds a CISO
Dark Reading Staff, Quick Hits
Democratic presidential hopeful Pete Buttigieg's campaign reportedly may be the first to bring a security exec on board.
By Dark Reading Staff , 8/7/2019
Comment0 comments  |  Read  |  Post a Comment
Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs
Robert Lemos, Contributing WriterNews
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.
By Robert Lemos Contributing Writer, 7/26/2019
Comment3 comments  |  Read  |  Post a Comment
New IPS Architecture Uses Network Flow Data for Analysis
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Can a stream of data intended for network performance monitoring be the basis of network security? One company says the answer is 'yes.'
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/23/2019
Comment1 Comment  |  Read  |  Post a Comment
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading
Too many systems, failure to test tools, and fear of replacement drive endpoint complexity and render products less effective.
By Kelly Sheridan Staff Editor, Dark Reading, 7/15/2019
Comment3 comments  |  Read  |  Post a Comment
Back to Basics with Log Management, SIEMs & MSSPs
Terry Sweeney, Contributing Editor
Not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.
By Terry Sweeney Contributing Editor, 7/12/2019
Comment3 comments  |  Read  |  Post a Comment
NIST Sets Draft Guidelines for Government AI
Dark Reading Staff, Quick Hits
This is the first formal step in writing the standards that will guide the implementation of AI technologies within the federal government.
By Dark Reading Staff , 7/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Toyota's Car-Hacking Tool Now Available
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
'PASTA' hardware and software kit now retails for $28,300.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/2/2019
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16199
PUBLISHED: 2019-09-17
eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.
CVE-2019-16391
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows authenticated visitors to modify any published content and execute other modifications in the database. This is related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php.
CVE-2019-16392
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 allows prive/formulaires/login.php XSS via error messages.
CVE-2019-16393
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 mishandles redirect URLs in ecrire/inc/headers.php with a %0D, %0A, or %20 character.
CVE-2019-16394
PUBLISHED: 2019-09-17
SPIP before 3.1.11 and 3.2 before 3.2.5 provides different error messages from the password-reminder page depending on whether an e-mail address exists, which might help attackers to enumerate subscribers.