Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

News & Commentary
Stronger Defenses Force Cybercriminals to Rethink Strategy
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers see the rise of new relationships and attack techniques as criminals put companies' resilience to the test.
By Kelly Sheridan Staff Editor, Dark Reading, 8/14/2019
Comment0 comments  |  Read  |  Post a Comment
Internet Routing Security Initiative Launches Online 'Observatory'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Mutually Agreed Norms for Routing Security (MANRS) lets network operators and the public view online router incidents worldwide.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/13/2019
Comment1 Comment  |  Read  |  Post a Comment
FBI Plans to Monitor Social Media May Spark Privacy Issues
Dark Reading Staff, Quick Hits
A new initiative to pull data from social media platforms may clash with policies prohibiting the use of information for mass surveillance.
By Dark Reading Staff , 8/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2019
Sara Peters, Senior Editor at Dark ReadingNews
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
By Sara Peters Senior Editor at Dark Reading, 8/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Buttigieg Campaign Adds a CISO
Dark Reading Staff, Quick Hits
Democratic presidential hopeful Pete Buttigieg's campaign reportedly may be the first to bring a security exec on board.
By Dark Reading Staff , 8/7/2019
Comment0 comments  |  Read  |  Post a Comment
Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs
Robert Lemos, Contributing WriterNews
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.
By Robert Lemos Contributing Writer, 7/26/2019
Comment3 comments  |  Read  |  Post a Comment
New IPS Architecture Uses Network Flow Data for Analysis
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Can a stream of data intended for network performance monitoring be the basis of network security? One company says the answer is 'yes.'
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/23/2019
Comment1 Comment  |  Read  |  Post a Comment
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading
Too many systems, failure to test tools, and fear of replacement drive endpoint complexity and render products less effective.
By Kelly Sheridan Staff Editor, Dark Reading, 7/15/2019
Comment3 comments  |  Read  |  Post a Comment
Back to Basics with Log Management, SIEMs & MSSPs
Terry Sweeney, Contributing Editor
Not fully clear about why your organization collects any (or all) log data? Experts offer their tips on making better use of log data and alerts to improve your security profile.
By Terry Sweeney Contributing Editor, 7/12/2019
Comment3 comments  |  Read  |  Post a Comment
NIST Sets Draft Guidelines for Government AI
Dark Reading Staff, Quick Hits
This is the first formal step in writing the standards that will guide the implementation of AI technologies within the federal government.
By Dark Reading Staff , 7/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Toyota's Car-Hacking Tool Now Available
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
'PASTA' hardware and software kit now retails for $28,300.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/2/2019
Comment3 comments  |  Read  |  Post a Comment
Chronicle Folds into Google
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/27/2019
Comment3 comments  |  Read  |  Post a Comment
7 Ways to Mitigate Supply Chain Attacks
Jai Vijayan, Contributing Writer
Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.
By Jai Vijayan Contributing Writer, 6/27/2019
Comment6 comments  |  Read  |  Post a Comment
Developers and Security Teams Under Pressure to Collaborate
Kelly Sheridan, Staff Editor, Dark ReadingNews
The challenges and benefits to getting two traditionally adversarial groups on the same page.
By Kelly Sheridan Staff Editor, Dark Reading, 6/26/2019
Comment12 comments  |  Read  |  Post a Comment
McAfee Sues 3 Former Staffers Now at Rival Tanium
Dark Reading Staff, Quick Hits
Lawsuit alleges sales representatives stole trade secrets from McAfee before joining Tanium.
By Dark Reading Staff , 6/26/2019
Comment1 Comment  |  Read  |  Post a Comment
Startup Raises $13.7M to Stop Breaches with Behavioral Analytics
Dark Reading Staff, Quick Hits
TrueFort plans to use the funding to expand sales, marketing, R&D, customer support, and go-to-market initiatives.
By Dark Reading Staff , 6/21/2019
Comment1 Comment  |  Read  |  Post a Comment
7 2019 Security Venture Fund Deals You Should Know
Curtis Franklin Jr., Senior Editor at Dark Reading
2019 has, so far, been a busy year for venture capitalists in the security industry. Here are 7 funding rounds important because of the technologies or market trends they represent.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/20/2019
Comment0 comments  |  Read  |  Post a Comment
Google Targets Deceptive Sites with New Chrome Tools
Dark Reading Staff, Quick Hits
A new extension and browser alert aim to help users report deceptive sites and prevent them from encountering fraud.
By Dark Reading Staff , 6/18/2019
Comment0 comments  |  Read  |  Post a Comment
10 Notable Security Acquisitions of 2019 (So Far)
Kelly Sheridan, Staff Editor, Dark Reading
In a year when security companies have been snapped up left and right, these deals stand out from the chaos.
By Kelly Sheridan Staff Editor, Dark Reading, 6/15/2019
Comment1 Comment  |  Read  |  Post a Comment
Better Cybersecurity Research Requires More Data Sharing
Robert Lemos, Contributing WriterNews
Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents.
By Robert Lemos Contributing Writer, 6/14/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by allenred
Current Conversations nice post
In reply to: cyber security
Post Your Own Reply
More Conversations
PR Newswire
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
The Flaw in Vulnerability Management: It's Time to Get Real
Jim Souders, Chief Executive Officer at Adaptiva,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5034
PUBLISHED: 2019-08-20
An exploitable information disclosure vulnerability exists in the Weave Legacy Pairing functionality of Nest Cam IQ Indoor version 4620002. A set of specially crafted weave packets can cause an out of bounds read, resulting in information disclosure. An attacker can send packets to trigger this vuln...
CVE-2019-5035
PUBLISHED: 2019-08-20
An exploitable information disclosure vulnerability exists in the Weave PASE pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted weave packets can brute force a pairing code, resulting in greater Weave access and potentially full device control. An attacker c...
CVE-2019-5036
PUBLISHED: 2019-08-20
An exploitable denial-of-service vulnerability exists in the Weave error reporting functionality of the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packets can cause an arbitrary Weave Exchange Session to close, resulting in a denial of service. An attacker can send a specially cr...
CVE-2019-8103
PUBLISHED: 2019-08-20
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation ...
CVE-2019-8104
PUBLISHED: 2019-08-20
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation ...