Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

News & Commentary
Travel Management Firm CWT Pays $4.5M to Ransomware Attackers
Dark Reading Staff, Quick Hits
Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.
By Dark Reading Staff , 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
3 Arrested for Massive Twitter Breach
Kelly Sheridan, Staff Editor, Dark ReadingQuick Hits
Three individuals aged 17, 19, and 22 have been charged for their alleged roles in the massive July 15 Twitter attack.
By Kelly Sheridan Staff Editor, Dark Reading, 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
New Initiative Links Cybersecurity Pros to Election Officials
Dark Reading Staff, Quick Hits
A University of Chicago Harris School of Public Policy initiative will build a database of cybersecurity volunteers.
By Dark Reading Staff , 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
Twitter: Employees Compromised in Phone Spear-Phishing Attack
Dark Reading Staff, Quick Hits
The attack earlier this month started with a spear-phishing attack targeting Twitter employees, the company says in a new update.
By Dark Reading Staff , 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
3 Ways Social Distancing Can Strengthen your Network
Dr. Mike Lloyd, CTO of RedSealCommentary
Security teams can learn a lot from the current pandemic to make modern hybrid business networks stronger and more resilient. Here's how.
By Dr. Mike Lloyd CTO of RedSeal, 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
'Hidden Property Abusing' Allows Attacks on Node.js Applications
Robert Lemos, Contributing WriterNews
A team of researchers from Georgia Tech find a new attack technique that targets properties in Node.js and plan to publicly release a tool that has already identified 13 new vulnerabilities.
By Robert Lemos Contributing Writer, 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark ReadingNews
Apple, Google, and Mozilla will shorten the life span for TLS certificates in a move poised to aid security but cause operational troubles.
By Kelly Sheridan Staff Editor, Dark Reading, 7/30/2020
Comment1 Comment  |  Read  |  Post a Comment
Dark Web Travel Fraudsters Left Hurting From Lockdowns
Ericka Chickowski, Contributing WriterNews
Shadow travel businesses that depend on loyalty program fraud have been impacted just like the legitimate travel orgs they prey on.
By Ericka Chickowski Contributing Writer, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
5 Tips for Optimizing Your Company's Cyber-Crisis Preparedness
James Hadley, CEO at Immersive LabsCommentary
Cyber-incident response often addresses short-term needs, but we need to broaden the view of crisis management to be more forward-thinking.
By James Hadley CEO at Immersive Labs, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
Black Hat Virtually: An Important Time to Come Together as a Community
Dan Lowden, CMO, White OpsCommentary
The significance of this year's event hasn't changed a whit. It's an opportunity to share what we've learned, and plan how to protect each other and the public for the remainder of the pandemic and beyond.
By Dan Lowden CMO, White Ops, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
Using the Attack Cycle to Up Your Security Game
Todd Graham, Vice President, VenrockCommentary
Like the universe, the attack surface is always expanding. Here's how to keep up and even get ahead.
By Todd Graham Vice President, Venrock, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
11 Security Tools to Expect at the Black Hat USA 2020 Arsenal Virtual Event
Jai Vijayan, Contributing Writer
More than 130 security researchers and developers are ready to showcase their work.
By Jai Vijayan Contributing Writer, 7/29/2020
Comment0 comments  |  Read  |  Post a Comment
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark ReadingNews
A flaw in the GRUB2 bootloader affects most Linux devices and some Windows computers using UEFI Secure Boot.
By Kelly Sheridan Staff Editor, Dark Reading, 7/29/2020
Comment2 comments  |  Read  |  Post a Comment
Security Flaws Discovered in OKCupid Dating Service
Dark Reading Staff, Quick Hits
Researchers identified a variety of vulnerabilities in apps and websites for the popular online dating platform.
By Dark Reading Staff , 7/29/2020
Comment1 Comment  |  Read  |  Post a Comment
70,000+ WordPress Sites Affected by Critical Plug-in Flaw
Dark Reading Staff, Quick Hits
A vulnerability in the wpDiscuz plug-in could let attackers remotely execute code on the servers of affected websites.
By Dark Reading Staff , 7/29/2020
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading Video News Desk Returns to Black Hat
Sara Peters, Senior Editor at Dark ReadingNews
Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!
By Sara Peters Senior Editor at Dark Reading, 7/29/2020
Comment0 comments  |  Read  |  Post a Comment
Technical Challenges of IoT Cybersecurity in a Post-COVID-19 World
Dr. Johannes Bauer, Principal Security Advisor at ULCommentary
Effective management of vulnerabilities can be done only when information about supply chain dependencies is accurate and recent.
By Dr. Johannes Bauer Principal Security Advisor at UL, 7/29/2020
Comment0 comments  |  Read  |  Post a Comment
The Future's Biggest Cybercrime Threat May Already Be Here
Steve Durbin, Managing Director of the Information Security ForumCommentary
Current attacks will continue to be refined, and what may seem a weakness now could turn out to be a disaster.
By Steve Durbin Managing Director of the Information Security Forum, 7/29/2020
Comment0 comments  |  Read  |  Post a Comment
Lazarus Group Shifts Gears with Custom Ransomware
Kelly Sheridan, Staff Editor, Dark ReadingNews
The North Korea-linked APT group has developed its own ransomware strain to better conduct financial theft, researchers report.
By Kelly Sheridan Staff Editor, Dark Reading, 7/28/2020
Comment2 comments  |  Read  |  Post a Comment
Avon Server Leaks User Info and Administrative Data
Dark Reading Staff, Quick Hits
An unprotected server has exposed more than 7GB of data from the beauty brand.
By Dark Reading Staff , 7/28/2020
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness
Robert Lemos, Contributing Writer,  7/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16271
PUBLISHED: 2020-08-03
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 generates insufficiently random numbers, which allows remote attackers to read and modify data in the KeePass database via a WebSocket connection.
CVE-2020-16272
PUBLISHED: 2020-08-03
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 is missing validation for a client-provided parameter, which allows remote attackers to read and modify data in the KeePass database via an A=0 WebSocket connection.
CVE-2020-8574
PUBLISHED: 2020-08-03
Active IQ Unified Manager for Linux versions prior to 9.6 ship with the Java Management Extension Remote Method Invocation (JMX RMI) service enabled allowing unauthorized code execution to local users.
CVE-2020-8575
PUBLISHED: 2020-08-03
Active IQ Unified Manager for VMware vSphere and Windows versions prior to 9.5 are susceptible to a vulnerability which allows administrative users to cause Denial of Service (DoS).
CVE-2020-12739
PUBLISHED: 2020-08-03
A vulnerability in the Fanuc i Series CNC (0i-MD and 0i Mate-MD) could allow an unauthenticated, remote attacker to cause an affected CNC to become inaccessible to other devices. The vulnerability is due to improper design or implementation of the Ethernet communication modules of the CNC. An attack...