Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

News & Commentary
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff, Quick Hits
Victims are being enticed to insert an unknown USB drive into their computers.
By Dark Reading Staff , 3/27/2020
Comment4 comments  |  Read  |  Post a Comment
Virgin Media Could Pay 4.5B for Leak Affecting 900,000 Customers
Dark Reading Staff, Quick Hits
A misconfigured database holding personal data was left available online between April 2019 and February 2020.
By Dark Reading Staff , 3/27/2020
Comment2 comments  |  Read  |  Post a Comment
The Wild, Wild West(world) of Cybersecurity
Bil Harmer​, CISO & Chief Evangelist at SecureAuthCommentary
Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.
By Bil Harmer​ CISO & Chief Evangelist at SecureAuth, 3/27/2020
Comment0 comments  |  Read  |  Post a Comment
Insurance Giant Chubb Might Be Ransomware Victim
Curtis Franklin Jr., Senior Editor at Dark ReadingQuick Hits
A ransomware operator claims to have successfully attacked Chubb Insurance databases.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/26/2020
Comment0 comments  |  Read  |  Post a Comment
Security Not a Priority for SAP Projects, Users Report
Dark Reading Staff, Quick Hits
Nearly 70% of SAP users surveyed believe organizations lacked focus on IT security during previous SAP implementations.
By Dark Reading Staff , 3/26/2020
Comment1 Comment  |  Read  |  Post a Comment
3 Mobile Security Problems That Most Security Teams Haven't Fixed Yet
Michael J. Covington, Vice President of Product Strategy at WanderaCommentary
Mobility must be included in the security operations workflow so that company data is protected regardless of where remote workers are located.
By Michael J. Covington Vice President of Product Strategy at Wandera, 3/26/2020
Comment1 Comment  |  Read  |  Post a Comment
Introducing Zero-Trust Access
Rik Turner, Principal Analyst, Infrastructure Solutions, OmdiaCommentary
It's too early to tell whether ZTA will be a VPN killer or not, but major players are ramping up products in this new class of security technology that focuses on the cloud.
By Rik Turner Principal Analyst, Infrastructure Solutions, Omdia, 3/26/2020
Comment1 Comment  |  Read  |  Post a Comment
Missing Patches, Misconfiguration Top Technical Breach Causes
Kelly Sheridan, Staff Editor, Dark ReadingNews
Less than half of businesses surveyed can patch critical vulnerabilities within 72 hours. Why does the process take so long?
By Kelly Sheridan Staff Editor, Dark Reading, 3/25/2020
Comment0 comments  |  Read  |  Post a Comment
Tupperware Hit by Card Skimmer Attack
Dark Reading Staff, Quick Hits
Malicious code was found hidden inside graphics files on the storage container maker's e-commerce website.
By Dark Reading Staff , 3/25/2020
Comment0 comments  |  Read  |  Post a Comment
Do DevOps Teams Need a Company Attorney on Speed Dial?
Shahar Sperling, Chief Architect at HCL AppScanCommentary
In today's regulatory and legislative environment, companies and individuals are exposed to lawsuits over security breaches, resulting in significant fines and ending careers.
By Shahar Sperling Chief Architect at HCL AppScan, 3/25/2020
Comment0 comments  |  Read  |  Post a Comment
FBI Shutters Russian-Based Hacker Platform, Makes Arrest
Dark Reading Staff, Quick Hits
The Deer.io platform let cybercriminals buy access to virtual storefronts where they could sell illicit products and services.
By Dark Reading Staff , 3/25/2020
Comment1 Comment  |  Read  |  Post a Comment
COVID-19: Getting Ready for the Next Business Continuity Challenge
Steve Winterfeld, Advisory CISO at AkamaiCommentary
What comes after you've empowered your remote workforce in the wake of the coronavirus pandemic? Dealing with a large portion of that workforce getting sick at the same time.
By Steve Winterfeld Advisory CISO at Akamai, 3/25/2020
Comment1 Comment  |  Read  |  Post a Comment
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers warn Microsoft 365 account holders to pay attention to unknown applications that request permissions.
By Kelly Sheridan Staff Editor, Dark Reading, 3/24/2020
Comment3 comments  |  Read  |  Post a Comment
Malware Found Hidden in Android Utility Apps, Children's Games
Dark Reading Staff, Quick Hits
The 'Tekya' malware, as researchers call it, is designed to imitate the user's actions to click advertisements.
By Dark Reading Staff , 3/24/2020
Comment0 comments  |  Read  |  Post a Comment
New APT Targets Middle Eastern Victims
Dark Reading Staff, Quick Hits
The new malware, dubbed "Milum," can take control of industrial devices.
By Dark Reading Staff , 3/24/2020
Comment0 comments  |  Read  |  Post a Comment
How to Secure Your Kubernetes Deployments
Gadi Naor, CTO and Co-Founder, AlcideCommentary
As more companies shift their software to a microservices-based architecture and orchestrate their containerized applications in Kubernetes, distributed security controls become a must.
By Gadi Naor CTO and Co-Founder, Alcide, 3/24/2020
Comment0 comments  |  Read  |  Post a Comment
Cybercriminals' Promises to Pause During Pandemic Amount to Little
Robert Lemos, Contributing WriterNews
As pandemic worsens, online profiteering -- from fraudsters to ransomware operators to cybercriminal hacking -- continues unabated, despite some promises from the underground.
By Robert Lemos Contributing Writer, 3/24/2020
Comment0 comments  |  Read  |  Post a Comment
Vulnerability Management Isn't Just a Numbers Game
Prateek Bhajanka, VP of Product Management, Vulnerability Management, Detection, and Response at QualysCommentary
Attackers work 24/7, so you have to be vigilant around the clock. Time for some game theory.
By Prateek Bhajanka VP of Product Management, Vulnerability Management, Detection, and Response at Qualys, 3/24/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Publishes Advisory for Windows Zero-Day
Kelly Sheridan, Staff Editor, Dark ReadingNews
There is no available patch for the vulnerabilities, which Microsoft says exist in all supported versions of Windows.
By Kelly Sheridan Staff Editor, Dark Reading, 3/23/2020
Comment0 comments  |  Read  |  Post a Comment
Three Ways Your BEC Defense Is Failing & How to Do Better
Curtis Franklin Jr., Senior Editor at Dark Reading
Business email compromises cost the economy billions of dollars. Experts have advice on how to stop them from hitting you for millions at a pop.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/23/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
8 Infosec Page-Turners for Days Spent Indoors
Kelly Sheridan, Staff Editor, Dark Reading,  3/23/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5527
PUBLISHED: 2020-03-30
When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource co...
CVE-2020-5551
PUBLISHED: 2020-03-30
Toyota 2017 Model Year DCU (Display Control Unit) allows an unauthenticated attacker within Bluetooth range to cause a denial of service attack and/or execute an arbitrary command. The affected DCUs are installed in Lexus (LC, LS, NX, RC, RC F), TOYOTA CAMRY, and TOYOTA SIENNA manufactured in the re...
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-6095
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.