Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

News & Commentary
5 Tips for Fighting Credential Stuffing Attacks
Joan Goodchild, Contributing Writer
With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts?
By Joan Goodchild Contributing Writer, 5/22/2020
Comment0 comments  |  Read  |  Post a Comment
Dark Reading Edge Cybersecurity Crossword Puzzle, May 22th
Edge Editors, Dark Reading
Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues...
By Edge Editors Dark Reading, 5/22/2020
Comment0 comments  |  Read  |  Post a Comment
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading
Mobile security experts share their go-to advice for protecting iPhones from hackers, thieves, and fraudsters.
By Kelly Sheridan Staff Editor, Dark Reading, 5/22/2020
Comment1 Comment  |  Read  |  Post a Comment
Security 101: Cross-Site Scripting
Curtis Franklin Jr., Senior Editor at Dark Reading
Cross-site scripting has been around longer than most security professionals have been on the job. Why is it still such an issue when we've known about it for so long?
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/21/2020
Comment0 comments  |  Read  |  Post a Comment
Hackers Serve Up Stolen Credentials from Home Chef
Dark Reading Staff, Quick Hits
Some 8 million of the meal delivery company's customer records have been offered for sale on the Dark Web.
By Dark Reading Staff , 5/21/2020
Comment0 comments  |  Read  |  Post a Comment
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, GarrisonCommentary
By committing to independent testing to determine value, vendors will ensure that their products do what they say they do.
By Henry Harrison Co-founder & Chief Technology Officer, Garrison, 5/21/2020
Comment2 comments  |  Read  |  Post a Comment
The Need for Compliance in a Post-COVID-19 World
Baan Alsinawi, Founder and Managing Director at TalaTekCommentary
With the current upheaval, business leaders may lose focus and push off implementing security measures, managing risk, and keeping up with compliance requirements. That's a big mistake.
By Baan Alsinawi Founder and Managing Director at TalaTek, 5/21/2020
Comment0 comments  |  Read  |  Post a Comment
60% of Insider Threats Involve Employees Planning to Leave
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers shows most "flight-risk" employees planning to leave an organization tend to start stealing data two to eight weeks before they go.
By Kelly Sheridan Staff Editor, Dark Reading, 5/20/2020
Comment0 comments  |  Read  |  Post a Comment
Digital Transformation Risks in Front-end Code
Ido Safruti, Co-founder & CTO, PerimeterXCommentary
Why making every front-end developer a DevSecOps expert will lead to a more holistic approach to web and native application security.
By Ido Safruti Co-founder & CTO, PerimeterX, 5/20/2020
Comment0 comments  |  Read  |  Post a Comment
Offers to Sell Enterprise Network Access Surge on Dark Web
Dark Reading Staff, Quick Hits
In contrast, Q1 2019 saw more interest in selling and buying access to individual servers.
By Dark Reading Staff , 5/20/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Warns of Vulnerability Affecting Windows DNS Server
Dark Reading Staff, Quick Hits
A new security advisory addresses a vulnerability that could be exploited to cause a denial-of-service attack.
By Dark Reading Staff , 5/20/2020
Comment0 comments  |  Read  |  Post a Comment
Coronavirus-Themed Phishing Fears Largely Overblown, Researchers Say
Robert Lemos, Contributing WriterNews
As COVID-19-themed spam rises, phishingnot so much. An analysis of newly registered domains finds that only 2.4% are actually phishing sites aiming to steal credentials.
By Robert Lemos Contributing Writer, 5/20/2020
Comment0 comments  |  Read  |  Post a Comment
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management StrategistCommentary
Enterprises need to recognize that remote access and other pandemic-related security challenges cannot be fixed with buzzwords or silver-bullet security tools.
By Dan Blum Cybersecurity & Risk Management Strategist, 5/20/2020
Comment1 Comment  |  Read  |  Post a Comment
Google Chrome Redesign Puts Security & Privacy in Users' Hands
Dark Reading Staff, Quick Hits
The Chrome browser will tell users if their browser is up to date, malicious extensions are installed, and/or a password has been compromised.
By Dark Reading Staff , 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
Unpatched Open Source Libraries Leave 71% of Apps Vulnerable
Robert Lemos, Contributing WriterNews
PHP and JavaScript developers need to pay close attention because different languages and frameworks have different rates of vulnerability, research finds.
By Robert Lemos Contributing Writer, 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
Web Application Attacks Double from 2019: Verizon DBIR
Kelly Sheridan, Staff Editor, Dark ReadingNews
Verizon's annual data breach report shows most attackers are external, money remains their top motivator, and web applications and unsecured cloud storage are hot targets.
By Kelly Sheridan Staff Editor, Dark Reading, 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
Long-Term Remote Work: Keeping Workers Productive & Secure
Joe Payne, President and CEO at Code42Commentary
The pandemic has changed how we get work done. Now, data security must catch up.
By Joe Payne President and CEO at Code42, 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
EasyJet Sees 9 Million Customer Email Addresses Stolen
Dark Reading Staff, Quick Hits
More than 2,000 customers also had credit card information taken in the attack.
By Dark Reading Staff , 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Extends Far Beyond Security Teams & Everyone Plays a Part
Jim Ivers, VP within the Synopsys Software Integrity GroupCommentary
Security isn't about tools or technology; it's about establishing a broad, fundamental awareness and sense of responsibility among all employees.
By Jim Ivers VP within the Synopsys Software Integrity Group, 5/19/2020
Comment0 comments  |  Read  |  Post a Comment
As DevOps Accelerates, Security's Role Changes
Kelly Sheridan, Staff Editor, Dark ReadingNews
There remains a disconnect between developers and security teams, with uncertainty around who should handle software security.
By Kelly Sheridan Staff Editor, Dark Reading, 5/18/2020
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13485
PUBLISHED: 2020-05-25
The Knock Knock plugin before 1.2.8 for Craft CMS allows IP Whitelist bypass via an X-Forwarded-For HTTP header.
CVE-2020-13486
PUBLISHED: 2020-05-25
The Knock Knock plugin before 1.2.8 for Craft CMS allows malicious redirection.
CVE-2020-13482
PUBLISHED: 2020-05-25
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
CVE-2020-13458
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There are CSRF issues with the log-clear controller action.
CVE-2020-13459
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There is stored XSS in the Bulk Resize action.