Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

News & Commentary
Researchers Find New Approach to Attacking Cloud Infrastructure
Kelly Sheridan, Staff Editor, Dark ReadingNews
Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.
By Kelly Sheridan Staff Editor, Dark Reading, 11/11/2019
Comment0 comments  |  Read  |  Post a Comment
5 Security Processes You Shouldn't Overlook During M&A
Julie Cullivan, Chief Technology and People Officer, Forescout TechnologiesCommentary
Security needs to be a central element of due diligence if a merger or acquisition is to succeed
By Julie Cullivan Chief Technology and People Officer, Forescout Technologies, 11/11/2019
Comment0 comments  |  Read  |  Post a Comment
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading
The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 11/8/2019
Comment1 Comment  |  Read  |  Post a Comment
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQCommentary
There is no premium that will recover the millions of dollars your company spends on R&D if your intellectual property is hacked and stolen.
By Chris Kennedy CISO & VP Customer Success, AttackIQ, 11/7/2019
Comment3 comments  |  Read  |  Post a Comment
The Uphill Battle of Triaging Alerts
Anton Chuvakin, Head of Security Solution Strategy, ChronicleCommentary
Prioritizing alerts is foundational to security, but almost every organization struggles to manage this process efficiently. Here's what you can do about it.
By Anton Chuvakin Head of Security Solution Strategy, Chronicle, 11/6/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft Tools Focus on Insider Risk, Data Protection at Ignite 2019
Kelly Sheridan, Staff Editor, Dark ReadingNews
New tools and updates aimed at addressing ongoing challenges with insider threats and sensitive data classification.
By Kelly Sheridan Staff Editor, Dark Reading, 11/4/2019
Comment1 Comment  |  Read  |  Post a Comment
Sumo Logic Buys JASK Labs to Tackle SOC Challenges
Dark Reading Staff, Quick Hits
Sumo Logic plans to integrate JASK's autonomous security operations center software into a new intelligence tool.
By Dark Reading Staff , 11/4/2019
Comment0 comments  |  Read  |  Post a Comment
Raising Security Awareness: Why Tools Can't Replace People
Lena Smart, Chief Information Security Officer, MongoDBCommentary
Training your people and building relationships outside of the security organization is the most significant investment a CISO can make.
By Lena Smart Chief Information Security Officer, MongoDB, 11/1/2019
Comment1 Comment  |  Read  |  Post a Comment
Quantifying Security Results to Justify Costs
Douglas Ferguson, Founder & CTO, Pharos SecurityCommentary
The CISO job isn't to protect the entire business from all threats for any budget. It's to spell out what level of protection executives can expect for a given budget.
By Douglas Ferguson Founder & CTO, Pharos Security, 10/31/2019
Comment2 comments  |  Read  |  Post a Comment
New Office 365 Phishing Scam Leaves A Voicemail
Dark Reading Staff, Quick Hits
A fake voice message lures victims to a fake Microsoft 365 login page that prompts them to enter credentials.
By Dark Reading Staff , 10/31/2019
Comment0 comments  |  Read  |  Post a Comment
9 Ways Data Vampires Are Bleeding Your Sensitive Information
Dr. Steve Marsh, Vice President at Nucleus CyberCommentary
Pull a Van Helsing on those sucking the lifeblood from your data and intellectual property.
By Dr. Steve Marsh Vice President at Nucleus Cyber, 10/31/2019
Comment0 comments  |  Read  |  Post a Comment
As Phishing Kits Evolve, Their Lifespans Shorten
Kelly Sheridan, Staff Editor, Dark ReadingNews
Most phishing kits last less than 20 days, a sign defenders are keeping up in the race against cybercrime.
By Kelly Sheridan Staff Editor, Dark Reading, 10/30/2019
Comment0 comments  |  Read  |  Post a Comment
Security Pros Fear Insider Attacks Stem from Cloud Apps
Dark Reading Staff, Quick Hits
More than half of security practitioners surveyed say insider attack detection has grown more difficult since migrating to cloud.
By Dark Reading Staff , 10/30/2019
Comment0 comments  |  Read  |  Post a Comment
Email Threats Poised to Haunt Security Pros into Next Decade
Eyal Benishti, CEO & Founder of IRONSCALESCommentary
Decentralized threat intel sharing, more public-private collaboration, and greater use of automated incident response are what's needed to combat phishing
By Eyal Benishti CEO & Founder of IRONSCALES, 10/30/2019
Comment0 comments  |  Read  |  Post a Comment
Hacking Phones: How Law Enforcement Is Saving Privacy
Matthew Rosenquist, Cybersecurity StrategistCommentary
It's no longer true that society must choose to either weaken everybody's privacy or let criminals run rampant.
By Matthew Rosenquist Cybersecurity Strategist, 10/30/2019
Comment1 Comment  |  Read  |  Post a Comment
Old RAT, New Moves: Adwind Hides in Java Commands to Target Windows
Kelly Sheridan, Staff Editor, Dark ReadingNews
The Adwind remote access Trojan conceals malicious activity in Java commands to slip past threat intelligence tools and steal user data.
By Kelly Sheridan Staff Editor, Dark Reading, 10/29/2019
Comment0 comments  |  Read  |  Post a Comment
Google Cloud Adds New Security Management Tools to G Suite
Dark Reading Staff, Quick Hits
Desktop devices that log into G Suite will have device management enabled by default, streamlining processes for IT admins.
By Dark Reading Staff , 10/29/2019
Comment0 comments  |  Read  |  Post a Comment
Why It's Imperative to Bridge the IT & OT Cultural Divide
Dave Weinstein, Chief Security Officer, ClarotyCommentary
As industrial enterprises face the disruptive forces of an increasingly connected world, these two cultures must learn to coexist.
By Dave Weinstein Chief Security Officer, Claroty, 10/29/2019
Comment0 comments  |  Read  |  Post a Comment
Fortinet Bolsters Endpoint Security with enSilo Acquisition
Robert Lemos, Contributing WriterNews
As companies reduce their vendor count, consolidation will likely continue to accelerate in the next year.
By Robert Lemos Contributing Writer, 10/28/2019
Comment0 comments  |  Read  |  Post a Comment
Pwn2Own Adds Industrial Control Systems to Hacking Contest
Kelly Sheridan, Staff Editor, Dark ReadingNews
The Zero Day Initiative will bring its first ICS Pwn2Own competition to the S4x20 conference in January.
By Kelly Sheridan Staff Editor, Dark Reading, 10/28/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by debrajohansen
Current Conversations thanks
In reply to: thanks
Post Your Own Reply
More Conversations
PR Newswire
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprise
Assessing Cybersecurity Risk in Today's Enterprise
Security leaders are struggling to understand their organizations risk exposure. While many are confident in their security strategies and processes, theyre also more concerned than ever about getting breached. Download this report today and get insights on how today's enterprises assess and perceive the risks they face in 2019!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18862
PUBLISHED: 2019-11-11
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.
CVE-2019-18853
PUBLISHED: 2019-11-11
ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
CVE-2019-18854
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to unlimited recursion for a '<use ... xlink:href="#identifier">' substring.
CVE-2019-18855
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to potentially unwanted elements or attributes.
CVE-2019-18856
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the SVG Sanitizer module through 8.x-1.0-alpha1 for Drupal because access to external resources with an SVG use element is mishandled.