Vulnerabilities / Threats

News & Commentary
'Dr. Shifro' Prescribes Fake Ransomware Cure
Dark Reading Staff, Quick Hits
A Russian firm aims to capitalize on ransomware victims' desperation by offering to unlock files then passing money to attackers.
By Dark Reading Staff , 12/10/2018
Comment0 comments  |  Read  |  Post a Comment
6 Cloud Security Predictions for 2019
Ory Segal, CTO, PureSecCommentary
How the fast pace of cloud computing adoption in 2018 will dramatically change the security landscape next year.
By Ory Segal CTO, PureSec, 12/10/2018
Comment0 comments  |  Read  |  Post a Comment
Kubernetes Deployments Around the World Show Vulnerabilities
Dark Reading Staff, Quick Hits
Kubernetes owners who expose APIs to the Internet are leaving their systems open to hackers.
By Dark Reading Staff , 12/7/2018
Comment0 comments  |  Read  |  Post a Comment
Insider Threats & Insider Objections
Richard Ford, Chief Scientist, ForcepointCommentary
The tyranny of the urgent and three other reasons why its hard for CISOs to establish a robust insider threat prevention program.
By Richard Ford Chief Scientist, Forcepoint, 12/7/2018
Comment0 comments  |  Read  |  Post a Comment
Kubernetes Vulnerability Hits Top of Severity Scale
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The security issue strikes at some of the basic reasons for the rising popularity of containers as an architecture and Kubernetes as an orchestration mechanism.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Adobe Flash Zero-Day Spreads via Office Docs
Kelly Sheridan, Staff Editor, Dark ReadingNews
Adobe has patched a zero-day in its Flash player after attackers leveraged the exploit in an active campaign.
By Kelly Sheridan Staff Editor, Dark Reading, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Bringing Compliance into the SecDevOps Process
Joe Ward, Senior Security Analyst, Bishop FoxCommentary
Application security should be guided by its responsibility to maintain the confidentiality, integrity, and availability of systems and data. But often, compliance clouds the picture.
By Joe Ward Senior Security Analyst, Bishop Fox, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
4 Lessons Die Hard Teaches About Combating Cyber Villains
Keith Graham, Chief Technology Officer, SecureAuthCommentary
With proper planning, modern approaches, and tools, we can all be heroes in the epic battle against the cyber threat.
By Keith Graham Chief Technology Officer, SecureAuth, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Apple Issues Security Fixes Across Mac, iOS
Dark Reading Staff, Quick Hits
Software updates for Mac and iOS bring patches to Safari, iCloud, iTunes on Windows, and tvOS.
By Dark Reading Staff , 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
55% of Companies Don't Offer Mandatory Security Awareness Training
Dark Reading Staff, Quick Hits
Even those that provide employee training do so sparingly, a new study finds.
By Dark Reading Staff , 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Boosting SOC IQ Levels with Knowledge Transfer
Mike Fowler, Vice President of Professional Services at DFLabsCommentary
Despite shortages of skills and staff, these six best practices can improve analysts' performance in a security operations center.
By Mike Fowler Vice President of Professional Services at DFLabs, 12/6/2018
Comment0 comments  |  Read  |  Post a Comment
Toyota Builds Open-Source Car-Hacking Tool
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
PASTA testing platform specs will be shared via open-source.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/5/2018
Comment0 comments  |  Read  |  Post a Comment
A Shift from Cybersecurity to Cyber Resilience: 6 Steps
Gus Hunt, Managing Director and Cyber Strategy Lead for Accenture Federal ServicesCommentary
Getting to cyber resilience means federal agencies must think differently about how they build and implement their systems. Here's where to begin.
By Gus Hunt Managing Director and Cyber Strategy Lead for Accenture Federal Services, 12/5/2018
Comment0 comments  |  Read  |  Post a Comment
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The unusually long dwell time in the Starwood breach has implications for both parent company Marriott International and the companies watching to learn from.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 12/5/2018
Comment1 Comment  |  Read  |  Post a Comment
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark ReadingNews
New research shows how attackers can abuse security questions in Windows 10 to maintain domain privileges.
By Kelly Sheridan Staff Editor, Dark Reading, 12/5/2018
Comment1 Comment  |  Read  |  Post a Comment
The Case for a Human Security Officer
Ira Winkler, CISSP, President, Secure MentemCommentary
Wanted: a security exec responsible for identifying and mitigating the attack vectors and vulnerabilities specifically targeting and involving people.
By Ira Winkler CISSP, President, Secure Mentem, 12/5/2018
Comment0 comments  |  Read  |  Post a Comment
Backdoors Up 44%, Ransomware Up 43% from 2017
Kelly Sheridan, Staff Editor, Dark ReadingNews
Nearly one in three computers was hit with a malware attack this year, and ransomware and backdoors continue to pose a risk.
By Kelly Sheridan Staff Editor, Dark Reading, 12/4/2018
Comment0 comments  |  Read  |  Post a Comment
Jared, Kay Jewelers Web Vuln Exposes Shoppers' Data
Dark Reading Staff, Quick Hits
A Jared customer found he could access other orders by changing a link in his confirmation email.
By Dark Reading Staff , 12/4/2018
Comment0 comments  |  Read  |  Post a Comment
5 Emerging Trends in Cybercrime
Derek Manky, Global Security Strategist, FortinetCommentary
Organizations can start today to protect against 2019's threats. Look out for crooks using AI "fuzzing" techniques, machine learning, and swarms.
By Derek Manky Global Security Strategist, Fortinet, 12/4/2018
Comment0 comments  |  Read  |  Post a Comment
'Influence Agents' Used Twitter to Sway 2018 Midterms
Dark Reading Staff, Quick Hits
About 25% of political support in Arizona and Florida was generated by influence agents using Twitter as a platform, research shows.
By Dark Reading Staff , 12/3/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I guess this answers the question: who's watching the watchers?
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20029
PUBLISHED: 2018-12-10
The nxfs.sys driver in the DokanFS library 0.6.0 in NoMachine before 6.4.6 on Windows 10 allows local users to cause a denial of service (BSOD) because uninitialized memory can be read.
CVE-2018-1279
PUBLISHED: 2018-12-10
Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on ...
CVE-2018-15800
PUBLISHED: 2018-12-10
Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage.
CVE-2018-15805
PUBLISHED: 2018-12-10
Accusoft PrizmDoc HTML5 Document Viewer before 13.5 contains an XML external entity (XXE) vulnerability, allowing an attacker to read arbitrary files or cause a denial of service (resource consumption).
CVE-2018-16635
PUBLISHED: 2018-12-10
Blackcat CMS 1.3.2 allows XSS via the willkommen.php?lang=DE page title at backend/pages/modify.php.