Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

News & Commentary
Microsoft Patches IE Zero-Day Among 74 Vulnerabilities
Kelly Sheridan, Staff Editor, Dark ReadingNews
The November Patch Tuesday update fixed 13 critical flaws, including a zero-day bug in Internet Explorer.
By Kelly Sheridan Staff Editor, Dark Reading, 11/12/2019
Comment0 comments  |  Read  |  Post a Comment
The Myths of Multifactor Authentication
Franois Amigorena, Founder & CEO, IS DecisionsCommentary
Organizations without MFA are wide open to attack when employees fall for phishing scams or share passwords. What's holding them back?
By Franois Amigorena Founder & CEO, IS Decisions, 11/12/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Disclose New Vulnerabilities in Windows Drivers
Kelly Sheridan, Staff Editor, Dark ReadingNews
Attackers could take advantage of simple design flaws in widely distributed drivers to gain control over Windows systems.
By Kelly Sheridan Staff Editor, Dark Reading, 11/12/2019
Comment0 comments  |  Read  |  Post a Comment
SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
Mark B. Cooper, President and Founder, PKI SolutionsCommentary
The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change.
By Mark B. Cooper President and Founder, PKI Solutions, 11/12/2019
Comment0 comments  |  Read  |  Post a Comment
DDoS Attack Targets UK Labour Party Weeks Ahead of Election
Dark Reading Staff, Quick Hits
Cybercriminals tried to take the Labour Party's digital platforms offline weeks before the election on December 12.
By Dark Reading Staff , 11/12/2019
Comment0 comments  |  Read  |  Post a Comment
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO AdvisorCommentary
Organizations realize the scale of cyber-risk but lack counter-actions to build resilience.
By Marc Wilczek Digital Strategist & CIO Advisor, 11/12/2019
Comment3 comments  |  Read  |  Post a Comment
Researchers Find New Approach to Attacking Cloud Infrastructure
Kelly Sheridan, Staff Editor, Dark ReadingNews
Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.
By Kelly Sheridan Staff Editor, Dark Reading, 11/11/2019
Comment0 comments  |  Read  |  Post a Comment
Joker's Stash Puts $130M Price Tag on Credit Card Database
Dark Reading Staff, Quick Hits
A new analysis advises security teams on what they should know about the underground payment card seller.
By Dark Reading Staff , 11/11/2019
Comment0 comments  |  Read  |  Post a Comment
5 Security Processes You Shouldn't Overlook During M&A
Julie Cullivan, Chief Technology and People Officer, Forescout TechnologiesCommentary
Security needs to be a central element of due diligence if a merger or acquisition is to succeed
By Julie Cullivan Chief Technology and People Officer, Forescout Technologies, 11/11/2019
Comment0 comments  |  Read  |  Post a Comment
Bugcrowd Pays Out Over $500K in Bounties in One Week
Jai Vijayan, Contributing WriterNews
In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone.
By Jai Vijayan Contributing Writer, 11/8/2019
Comment0 comments  |  Read  |  Post a Comment
Hospital Cyberattacks Linked to Increase in Heart Attack Mortality
Dark Reading Staff, Quick Hits
Breach remediation processes adversely impact timeliness in patient care and outcomes, a new study finds.
By Dark Reading Staff , 11/8/2019
Comment0 comments  |  Read  |  Post a Comment
Ring Flaw Underscores Impact of IoT Vulnerabilities
Robert Lemos, Contributing WriterNews
A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.
By Robert Lemos Contributing Writer, 11/8/2019
Comment0 comments  |  Read  |  Post a Comment
9 Principles to Simplify Security
Menny Barzilay, CEO at Cytactic & Founder of the THINK:CYBER NewsletterCommentary
This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.
By Menny Barzilay CEO at Cytactic & Founder of the THINK:CYBER Newsletter, 11/8/2019
Comment0 comments  |  Read  |  Post a Comment
TA542 Brings Back Emotet with Late September Spike
Kelly Sheridan, Staff Editor, Dark ReadingNews
Overall volumes of banking Trojans and RATs increased during the third quarter, when Emotet was suspiciously absent until mid-September.
By Kelly Sheridan Staff Editor, Dark Reading, 11/7/2019
Comment0 comments  |  Read  |  Post a Comment
To Prove Cybersecurity's Worth, Create a Cyber Balance Sheet
Andrew Morrison, Principal, Cyber Risk Services, at DeloitteCommentary
How tying and measuring security investments to business impacts can elevate executives' understanding and commitment to cyber-risk reduction.
By Andrew Morrison Principal, Cyber Risk Services, at Deloitte, 11/7/2019
Comment0 comments  |  Read  |  Post a Comment
PayPal Upsets Microsoft as Phishers' Favorite Brand
Dark Reading Staff, Quick Hits
Several factors edged the world's most popular payment service into the top spot.
By Dark Reading Staff , 11/7/2019
Comment0 comments  |  Read  |  Post a Comment
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQCommentary
There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.
By Chris Kennedy CISO & VP Customer Success, AttackIQ, 11/7/2019
Comment3 comments  |  Read  |  Post a Comment
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff,  News
Security researcher Stanislas Lejay offers a preview of his upcoming Black Hat Europe talk on automotive engine computer management and hardware reverse engineering.
By By Alex Wawro, Special to Dark Reading , 11/7/2019
Comment2 comments  |  Read  |  Post a Comment
Accounting Scams Continue to Bilk Businesses
Robert Lemos, Contributing WriterNews
Yes, ransomware is plaguing businesses and government organizations, but impersonators inserting themselves into financial workflows most often via e-mail continue to enable big paydays.
By Robert Lemos Contributing Writer, 11/6/2019
Comment0 comments  |  Read  |  Post a Comment
Google Announces App Defense Alliance
Dark Reading Staff, Quick Hits
The industry partnership will scan apps for malware before they're published on the Google Play Store.
By Dark Reading Staff , 11/6/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by charlesemorris
Current Conversations wow
In reply to: Re: thank for somuch
Post Your Own Reply
More Conversations
PR Newswire
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.