Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

News & Commentary
Sophos for Sale: Thoma Bravo Offers $3.9B
Kelly Sheridan, Staff Editor, Dark ReadingNews
Sophos' board of directors plans to unanimously recommend the offer to the company's shareholders.
By Kelly Sheridan Staff Editor, Dark Reading, 10/14/2019
Comment0 comments  |  Read  |  Post a Comment
Tamper Protection Arrives for Microsoft Defender ATP
Dark Reading Staff, Quick Hits
The feature, designed to block unauthorized changes to security features, is now generally available.
By Dark Reading Staff , 10/14/2019
Comment0 comments  |  Read  |  Post a Comment
Akamai Snaps Up ChameleonX to Tackle Magecart
Dark Reading Staff, Quick Hits
The Israel-based ChameleonX aims to protect websites from cyberattacks targeting payment data.
By Dark Reading Staff , 10/10/2019
Comment0 comments  |  Read  |  Post a Comment
Magecart Attack on Volusion Highlights Supply Chain Dangers
Kelly Sheridan, Staff Editor, Dark ReadingNews
Attackers compromised Volusion's Google Cloud environment to load malicious skimmer code onto more than 6,500 customer sites.
By Kelly Sheridan Staff Editor, Dark Reading, 10/10/2019
Comment0 comments  |  Read  |  Post a Comment
How the Software-Defined Perimeter Is Redefining Access Control
Gilad Steinberg, Founder & CTO at Odo SecurityCommentary
In a world where traditional network boundaries no longer exist, VPNs are showing their age.
By Gilad Steinberg Founder & CTO at Odo Security, 10/9/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft Issues 9 Critical Security Patches
Kelly Sheridan, Staff Editor, Dark ReadingNews
None of the total 59 patches were for previously known vulnerabilities nor are any under active attack, Microsoft reports.
By Kelly Sheridan Staff Editor, Dark Reading, 10/8/2019
Comment0 comments  |  Read  |  Post a Comment
Business Email Compromise Attacks Spike 269%
Dark Reading Staff, Quick Hits
A new Mimecast report finds a significant uptick in BEC attacks, malware attachments, and spam landing in target inboxes.
By Dark Reading Staff , 10/8/2019
Comment0 comments  |  Read  |  Post a Comment
8 Ways Businesses Unknowingly Help Hackers
Kelly Sheridan, Staff Editor, Dark Reading
From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in.
By Kelly Sheridan Staff Editor, Dark Reading, 10/4/2019
Comment0 comments  |  Read  |  Post a Comment
Researchers Link Magecart Group 4 to Cobalt Group
Kelly Sheridan, Staff Editor, Dark ReadingNews
Their findings demonstrate how Group 4 is likely conducting server-side skimming in addition to client-side activity.
By Kelly Sheridan Staff Editor, Dark Reading, 10/3/2019
Comment0 comments  |  Read  |  Post a Comment
New Silent Starling Attack Group Puts Spin on BEC
Kelly Sheridan, Staff Editor, Dark ReadingNews
The West African cybergang has successfully infiltrated more than 500 companies using a tactic dubbed 'vendor email compromise.'
By Kelly Sheridan Staff Editor, Dark Reading, 10/2/2019
Comment0 comments  |  Read  |  Post a Comment
218M Words with Friends Players Compromised in Data Breach
Dark Reading Staff, Quick Hits
The same attacker was reportedly behind the Collection #1 and Collection #2 data dumps earlier this year.
By Dark Reading Staff , 9/30/2019
Comment0 comments  |  Read  |  Post a Comment
Cloud Vulnerability Could Let One Server Compromise Thousands
Kelly Sheridan, Staff Editor, Dark ReadingNews
A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.
By Kelly Sheridan Staff Editor, Dark Reading, 9/27/2019
Comment2 comments  |  Read  |  Post a Comment
DoorDash Breach Affects 4.9M Merchants, Customers, Workers
Dark Reading Staff, Quick Hits
The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.
By Dark Reading Staff , 9/27/2019
Comment0 comments  |  Read  |  Post a Comment
Cloud-Native Applications: Shift to Serverless is Underway
Kelly Sheridan, Staff Editor, Dark ReadingNews
A new report explores changes in cloud-native applications and complexities involved with securing them.
By Kelly Sheridan Staff Editor, Dark Reading, 9/26/2019
Comment0 comments  |  Read  |  Post a Comment
Airbus Cyberattack Landed on Suppliers' Networks
Dark Reading Staff, Quick Hits
Four separate incidents over the past year have targeted Airbus suppliers for the manufacturer's sensitive commercial data.
By Dark Reading Staff , 9/26/2019
Comment0 comments  |  Read  |  Post a Comment
When Compliance Isn't Enough: A Case for Integrated Risk Management
Kelly Sheridan, Staff Editor, Dark ReadingNews
Why governance, risk, and compliance solutions lull companies into a false sense of security, and how to form a more effective approach.
By Kelly Sheridan Staff Editor, Dark Reading, 9/25/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft's Azure Sentinel SIEM Now Generally Available
Dark Reading Staff, Quick Hits
The cloud-native SIEM is designed to search data from users, applications, servers, and devices running on-prem and in the cloud.
By Dark Reading Staff , 9/25/2019
Comment1 Comment  |  Read  |  Post a Comment
Rethinking Risk Management
Kelly Sheridan, Staff Editor, Dark ReadingNews
Where most organizations fall short in risk management tools, technologies, and talent, and how they can improve.
By Kelly Sheridan Staff Editor, Dark Reading, 9/23/2019
Comment0 comments  |  Read  |  Post a Comment
YouTube Creators Hit in Account Hijacking Campaign
Dark Reading Staff, Quick Hits
The victims, who post car reviews and other videos about the auto industry, were targeted in a seemingly coordinated campaign to steal account access.
By Dark Reading Staff , 9/23/2019
Comment0 comments  |  Read  |  Post a Comment
7 Ways VPNs Can Turn from Ally to Threat
Curtis Franklin Jr., Senior Editor at Dark Reading
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 9/21/2019
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17593
PUBLISHED: 2019-10-14
JIZHICMS 1.5.1 allows admin.php/Admin/adminadd.html CSRF to add an administrator.
CVE-2019-17594
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
CVE-2019-17595
PUBLISHED: 2019-10-14
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
CVE-2019-14823
PUBLISHED: 2019-10-14
A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to...
CVE-2019-17592
PUBLISHED: 2019-10-14
The csv-parse module before 4.4.6 for Node.js is vulnerable to Regular Expression Denial of Service. The __isInt() function contains a malformed regular expression that processes large crafted input very slowly. This is triggered when using the cast option.