Application Security

News & Commentary
As Businesses Move Critical Data to Cloud, Security Risks Abound
Kelly Sheridan, Staff Editor, Dark ReadingNews
Companies think their data is safer in the public cloud than in on-prem data centers, but the transition is driving security issues.
By Kelly Sheridan Staff Editor, Dark Reading, 2/20/2019
Comment0 comments  |  Read  |  Post a Comment
POS Vendor Announces January Data Breach
Dark Reading Staff, Quick Hits
More than 120 restaurants were affected by an incident that exposed customer credit card information.
By Dark Reading Staff , 2/20/2019
Comment0 comments  |  Read  |  Post a Comment
Mastercard, GCA Create Small Business Cybersecurity Toolkit
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/20/2019
Comment0 comments  |  Read  |  Post a Comment
The Anatomy of a Lazy Phish
Jordan Shakhsheer, Information Security Engineer, Bluestone AnalyticsCommentary
A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.
By Jordan Shakhsheer Information Security Engineer, Bluestone Analytics, 2/20/2019
Comment0 comments  |  Read  |  Post a Comment
Breach in Stanford System Exposes Student Records
Dark Reading Staff, Quick Hits
A wide variety of data was visible through the vulnerability.
By Dark Reading Staff , 2/19/2019
Comment0 comments  |  Read  |  Post a Comment
Palo Alto Networks to Buy Demisto for $560M
Dark Reading Staff, Quick Hits
This marks Palo Alto Networks' latest acquisition and its first of 2019.
By Dark Reading Staff , 2/19/2019
Comment0 comments  |  Read  |  Post a Comment
Staffing Shortage Makes Vulnerabilities Worse
Dark Reading Staff, Quick Hits
Businesses don't have sufficient staff to find vulnerabilities or protect against their exploit, according to a new report by Ponemon Institute.
By Dark Reading Staff , 2/15/2019
Comment1 Comment  |  Read  |  Post a Comment
Hackers Found Phishing for Facebook Credentials
Dark Reading Staff, Quick Hits
A "very realistic-looking" login prompt is designed to capture users' Facebook credentials, researchers report.
By Dark Reading Staff , 2/15/2019
Comment0 comments  |  Read  |  Post a Comment
Post-Quantum Crypto Standards Arent All About the Math
Ericka Chickowski, Contributing Writer, Dark ReadingNews
The industry needs to keep in mind the realities of hardware limits and transitional growing pains, according to Microsoft, Utimaco researchers.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/15/2019
Comment0 comments  |  Read  |  Post a Comment
White-Hat Bug Bounty Programs Draw Inspiration from the Old West
Michelle Moore, Academic Director and Adjunct Professor, University of San DiegoCommentary
These programs are now an essential strategy in keeping the digital desperados at bay.
By Michelle Moore Academic Director and Adjunct Professor, University of San Diego, 2/15/2019
Comment0 comments  |  Read  |  Post a Comment
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
New initiative offers five principles for greater IoT security.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/14/2019
Comment1 Comment  |  Read  |  Post a Comment
Coffee Meets Bagel Confirms Hack on Valentine's Day
Dark Reading Staff, Quick Hits
The dating app says users' account data may have been obtained by an unauthorized party.
By Dark Reading Staff , 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Dig into Microsoft Office Functionality Flaws
Kelly Sheridan, Staff Editor, Dark ReadingNews
An ongoing study investigating security bugs in Microsoft Office has so far led to two security patches.
By Kelly Sheridan Staff Editor, Dark Reading, 2/13/2019
Comment0 comments  |  Read  |  Post a Comment
5 Expert Tips for Complying with the New PCI Software Security Framework
Rohit Sethi, COO of Security CompassCommentary
The Secure SLC Standard improves business efficiency for payment application vendors but could also stand as new security benchmark for other industries to follow.
By Rohit Sethi COO of Security Compass, 2/13/2019
Comment0 comments  |  Read  |  Post a Comment
70% of Consumers Want Biometrics in the Workplace
Steve Zurier, Freelance WriterNews
Speed, simplicity, and security underscore their desire, a new study shows.
By Steve Zurier Freelance Writer, 2/13/2019
Comment0 comments  |  Read  |  Post a Comment
Lessons Learned from a Hard-Hitting Security Review
Jaspreet Singh, founder and CEO of DruvaCommentary
Information security is a corporate posture and must be managed at all levels: systems, software, personnel, and all the key processes.
By Jaspreet Singh founder and CEO of Druva, 2/13/2019
Comment0 comments  |  Read  |  Post a Comment
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark ReadingNews
Australian property valuation firm Landmark White exposed files containing personal data and property valuation details.
By Kelly Sheridan Staff Editor, Dark Reading, 2/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft, Adobe Both Close More Than 70 Security Issues
Robert Lemos, Technology Journalist/Data ResearcherNews
With their regularly scheduled Patch Tuesday updates, both companies issued fixes for scores of vulnerabilities in their widely used software.
By Robert Lemos , 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
Symantec Acquires Luminate to Build on Cloud Security
Dark Reading Staff, Quick Hits
Luminate Security, which specializes in software-defined perimeter technology, will extend Symantec's integrated defense platform.
By Dark Reading Staff , 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
Identifying, Understanding & Combating Insider Threats
Ilan Paretsky, Chief Marketing Officer of EricomCommentary
Your organization is almost certainly on the lookout for threats from outside the company. But are you ready to address threats from within?
By Ilan Paretsky Chief Marketing Officer of Ericom, 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3474
PUBLISHED: 2019-02-20
A path traversal vulnerability in the web application component of Micro Focus Filr 3.x allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Filr server. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-3475
PUBLISHED: 2019-02-20
A local privilege escalation vulnerability in the famtd component of Micro Focus Filr 3.0 allows a local attacker authenticated as a low privilege user to escalate to root. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-10030
PUBLISHED: 2019-02-20
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVE-2019-10030
PUBLISHED: 2019-02-20
A exposure of sensitive information vulnerability exists in Jenkins Cloud Foundry Plugin 2.3.1 and earlier in AbstractCloudFoundryPushDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through anoth...
CVE-2019-10030
PUBLISHED: 2019-02-20
A server-side request forgery vulnerability exists in Jenkins Mattermost Notification Plugin 2.6.2 and earlier in MattermostNotifier.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified Mattermost server and room and send a message.