Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary
Insecure Home IoT Devices a Clear and Present Danger to Corporate Security
Jai Vijayan, Contributing WriterNews
Avast-sponsored study shows wide prevalence of IoT devices, many with weak credentials and other security vulnerabilities.
By Jai Vijayan Contributing Writer, 6/19/2019
Comment2 comments  |  Read  |  Post a Comment
Power Outage Hits Millions in South America
Dark Reading Staff, Quick Hits
The outage, which is not (so far) seen as the result of a cyberattack, still had a significant impact on network and server availability.
By Dark Reading Staff , 6/17/2019
Comment0 comments  |  Read  |  Post a Comment
Cyberattack Hits Aircraft Parts Manufacturer
Dark Reading Staff, Quick Hits
Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear.
By Dark Reading Staff , 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
Cisco Buys Sentryo
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Cisco is adding the French company's network visibility products to its IoT network lineup.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/6/2019
Comment0 comments  |  Read  |  Post a Comment
How to Get the Most Benefits from Biometrics
Bojan Simic, Chief Technology Officer & Co-Founder of HYPRCommentary
Providing an easy-to-use, uniform authentication experience without passwords is simpler than you may think.
By Bojan Simic Chief Technology Officer & Co-Founder of HYPR, 6/5/2019
Comment2 comments  |  Read  |  Post a Comment
Focusing on Endpoints: 5 Steps to Fight Cybercrime
Matthew Lewinski, Distinguished Engineer at Quest SoftwareCommentary
Follow these best practices to strengthen endpoint management strategies and protect company data.
By Matthew Lewinski Distinguished Engineer at Quest Software, 5/31/2019
Comment3 comments  |  Read  |  Post a Comment
7 Recent Wins Against Cybercrime
Jai Vijayan, Contributing Writer
The increasing number of successful law enforcement actions and prosecutions suggest that cybercriminals have plenty of reason to be looking over their shoulders.
By Jai Vijayan Contributing Writer, 5/24/2019
Comment0 comments  |  Read  |  Post a Comment
To Manage Security Risk, Manage Data First
Kelly Sheridan, Staff Editor, Dark ReadingNews
At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk.
By Kelly Sheridan Staff Editor, Dark Reading, 5/23/2019
Comment1 Comment  |  Read  |  Post a Comment
Consumer IoT Devices Are Compromising Enterprise Networks
Ericka Chickowski, Contributing WriterNews
While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks.
By Ericka Chickowski Contributing Writer, 5/22/2019
Comment0 comments  |  Read  |  Post a Comment
DHS Warns of Data Theft via Chinese-Made Drones
Dark Reading Staff, Quick Hits
The drones are reportedly built with parts that can compromise organizations' data and share it on a server accessible to the Chinese government.
By Dark Reading Staff , 5/20/2019
Comment0 comments  |  Read  |  Post a Comment
When Older Windows Systems Won't Die
Kelly Sheridan, Staff Editor, Dark ReadingNews
Microsoft's decision to patch unsupported machines for the critical CVE-2019-0708 flaw is a reminder that XP, 2003, and other older versions of Windows still run in some enterprises.
By Kelly Sheridan Staff Editor, Dark Reading, 5/17/2019
Comment0 comments  |  Read  |  Post a Comment
Introducing the Digital Transformation Architect
Jordan Blake, VP of Products at BehavioSecCommentary
Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams.
By Jordan Blake VP of Products at BehavioSec, 5/15/2019
Comment0 comments  |  Read  |  Post a Comment
Sectigo Buys Icon Labs to Expand IoT Security Platform
Dark Reading Staff, Quick Hits
End-to-end IoT security product aims to give manufacturers, systems integrators, and businesses a means to harden device security.
By Dark Reading Staff , 5/9/2019
Comment0 comments  |  Read  |  Post a Comment
Security Depends on Careful Design
Susanto Irwan, Co-Founder and VP of Engineering at Xage SecurityCommentary
Deploying focused edge protection on-site extends security beyond the network level to shield millions of previously exposed devices, apps, and control systems.
By Susanto Irwan Co-Founder and VP of Engineering at Xage Security, 5/2/2019
Comment0 comments  |  Read  |  Post a Comment
Peer-to-Peer Vulnerability Exposes Millions of IoT Devices
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A flaw in the software used to remotely access cameras and monitoring devices could allow hackers to easily take control of millions of pieces of the IoT.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/29/2019
Comment0 comments  |  Read  |  Post a Comment
Malware Makes Itself at Home in Set-Top Boxes
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Low-cost boxes that promise free TV streaming services often come complete with malware, according to a new study.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/26/2019
Comment0 comments  |  Read  |  Post a Comment
Go Medieval to Keep OT Safe
Ilan Abadi, VP and Global CISO, Teva Pharmaceutical IndustriesCommentary
When it comes to operational technology and industrial control systems, make sure you're the lord of all you survey.
By Ilan Abadi VP and Global CISO, Teva Pharmaceutical Industries, 4/26/2019
Comment1 Comment  |  Read  |  Post a Comment
Regulations, Insider Threat Handicap Healthcare IT Security
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Healthcare IoT is expanding opportunities for hackers as the sector struggles to keep up security-wise.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/25/2019
Comment0 comments  |  Read  |  Post a Comment
Free Princeton Application Provides IoT Traffic Insight
Dark Reading Staff, Quick Hits
The application developed by a research group allows users to spot possible IoT security problems.
By Dark Reading Staff , 4/19/2019
Comment1 Comment  |  Read  |  Post a Comment
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor NetworksCommentary
By blocking threats and attacks nearer to their sources, cybersecurity pros could help turn the connected world into a safer place for all.
By Darren Anstee Chief Technology Officer at Arbor Networks, 4/19/2019
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Tim Mackey, Principal Security Strategist, CyRC, at Synopsys,  6/18/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-06-19
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are, and Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise ...
PUBLISHED: 2019-06-19
Dell EMC Avamar ADMe Web Interface 1.0.50 and 1.0.51 are affected by an LFI vulnerability which may allow a malicious user to download arbitrary files from the affected system by sending a specially crafted request to the Web Interface application.
PUBLISHED: 2019-06-19
Cloud Foundry UAA, versions prior to 73.0.0, falls back to appending ?unknown.org? to a user's email address when one is not provided and the user name does not contain an @ character. This domain is held by a private company, which leads to attack vectors including password recovery emails sent to ...
PUBLISHED: 2019-06-19
BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
PUBLISHED: 2019-06-19
Alternate Pic View 2.600 has a User Mode Write AV starting at PicViewer!PerfgrapFinalize+0x00000000000a8868.