Upcoming Webinars

Webinar Archives
Dark Reading Virtual Event: Why Cybercriminals Attack
Date: Jun 27, 2018
View webinar
If you'd like to know more about the methods and motivations of threat actors who may be targeting your organization, this virtual event is for you.

Inside the Cyber Underworld: The Black Market Report
Date: Jun 21, 2018
View webinar
This webinar reveals the Armor's Threat Resistance Unit (TRU) research teams findings based on data from dozens of underground markets and forums to offer a look at how the market for cybercriminals' goods and services continues to thrive.

Phishing: Trends, Attacks & Defense Strategies
Date: Jun 14, 2018
View webinar
This webinar analyzes the phishing trends, attacks and defense strategies across global enterprises and will even offer some predictions of what to expect in 2018.

Improving Enterprise Authentication: Taming the Password Beast
Date: Jun 12, 2018
View webinar
Hear as experts discuss emerging methods for solving the authentication problem, and the need for building authentication strategies that go beyond the enterprise premises.

Malicious Insiders: Real Defense for Real Businesses
Date: Jun 05, 2018
View webinar
Learn how you can address the insider threat without shutting down business.

Threat Intelligence: Where to Start & What to Ask
Date: May 31, 2018
View webinar
In this session, you'll get a look at some of the different types and sources of threat intelligence data, and you'll get advice on how to choose the right ones - and how to use these varied information sources to improve your defenses.

[Dark Reading Crash Course] Protecting Your Data In the Cloud
Date: May 24, 2018
View webinar
Join us as a cloud security expert discusses how rather than be afraid of cloud computing, security experts can take better advantage of the cloud to improve security across the board.

Cloud & Security Risks: How to Discover and Manage Them
Date: May 24, 2018
View webinar
Come learn how to discover and manage security and cloud risks in all cloud providers, at hyper speed and with no scaling limits.

New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11403
PUBLISHED: 2018-05-24
DomainMod v4.09.03 has XSS via the assets/edit/account-owner.php oid parameter.
CVE-2018-11404
PUBLISHED: 2018-05-24
DomainMod v4.09.03 has XSS via the assets/edit/ssl-provider-account.php sslpaid parameter.
CVE-2018-11405
PUBLISHED: 2018-05-24
Kliqqi 2.0.2 has CSRF in admin/admin_users.php.
CVE-2018-11410
PUBLISHED: 2018-05-24
An issue was discovered in Liblouis 3.5.0. A invalid free in the compileRule function in compileTranslationTable.c allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
CVE-2018-11399
PUBLISHED: 2018-05-24
SimpliSafe Original has Unencrypted Sensor Transmissions, which allows physically proximate attackers to obtain potentially sensitive information about the specific times when alarm-system events occur.