Vulnerabilities / Threats //

Advanced Threats

News & Commentary
Reuters: Microsoft's 2013 Breach Hit Bug Repository, Insiders Say
Dark Reading Staff, Quick Hits
Five anonymous former Microsoft employees tell Reuters that Microsoft's database of internally discovered vulnerabilities was compromised in 2013, but Microsoft will not confirm it occurred.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Adobe Patches Flash ZeroDay Used To Plant Surveillance Software
Dark Reading Staff, Quick Hits
Second time in four weeks FINSPY "lawful intercept" tool and a zero-day found together.
By Dark Reading Staff , 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
Unstructured Data: The Threat You Cannot See
Charles Fullwood, Software Practice Director at Force 3Commentary
Why security teams needs to take a cognitive approach to the increasing volumes of data flowing from sources they don't control.
By Charles Fullwood Software Practice Director at Force 3, 10/10/2017
Comment0 comments  |  Read  |  Post a Comment
What Security Teams Need to Know about the NIAC Report
Mike Shultz, CEO of CybernanceCommentary
Which of the recommendations made by the NIAC working group will affect security teams the most, and how should they prepare?
By Mike Shultz CEO of Cybernance, 10/4/2017
Comment0 comments  |  Read  |  Post a Comment
Why Your Business Must Care about Privacy
Niko Keller, Co-founder and CTO of Opaque CommunicationsCommentary
It might not have something to hide, but it definitely has something to protect.
By Niko Keller Co-founder and CTO of Opaque Communications, 9/26/2017
Comment1 Comment  |  Read  |  Post a Comment
FBI's Freese Shares Risk Management Tips
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Deputy Assistant Director Donald Freese advises enterprises to lead with a business case and not fear addressing the C-suite on risk management.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/26/2017
Comment0 comments  |  Read  |  Post a Comment
After DHS Notice, 21 States Reveal They Were Targeted During Election
Dark Reading Staff, Quick Hits
Election officials in swing states Florida, Ohio, and Pennsylvania among those who report Russian state-sponsored attackers targeted their systems.
By Dark Reading Staff , 9/25/2017
Comment18 comments  |  Read  |  Post a Comment
Security's #1 Problem: Economic Incentives
Dimitri Stiliadis, CEO of AporetoCommentary
The industry rewards cutting corners rather than making software safe. Case in point: the Equifax breach.
By Dimitri Stiliadis CEO of Aporeto, 9/25/2017
Comment15 comments  |  Read  |  Post a Comment
Why Size Doesn't Matter in DDoS Attacks
Nicolai Bezsonoff, General Manager, Security Solutions, NeustarCommentary
Companies both large and small are targets. Never think "I'm not big enough for a hacker's attention."
By Nicolai Bezsonoff General Manager, Security Solutions, Neustar, 9/21/2017
Comment1 Comment  |  Read  |  Post a Comment
Get Serious about IoT Security
Derek Manky, Global Security Strategist, FortinetCommentary
These four best practices will help safeguard your organization in the Internet of Things.
By Derek Manky Global Security Strategist, Fortinet, 9/20/2017
Comment4 comments  |  Read  |  Post a Comment
How Apple's New Facial Recognition Technology Will Change Enterprise Security
Shimrit Tzur-David, CTO & Co-founder, Secret Double OctopusCommentary
Expect a trickle-down effect, as tech similar to Face ID becomes offered outside of Apple.
By Shimrit Tzur-David CTO & Co-founder, Secret Double Octopus, 9/19/2017
Comment0 comments  |  Read  |  Post a Comment
To Be Ready for the Security Future, Pay Attention to the Security Past
Liz Maida,  Co-founder, CEO & CTO, Uplevel SecurityCommentary
It's easy to just move on to the next problem, ignoring what's happened -- but that's a mistake.
By Liz Maida Co-founder, CEO & CTO, Uplevel Security, 9/18/2017
Comment5 comments  |  Read  |  Post a Comment
5 Problems That Keep CISOs Awake at Night
Joshua Douglas, Chief Strategy Officer, RaytheonCommentary
The last few years have shown a big difference in the way cyber-risks are acknowledged, but progress still needs to be made.
By Joshua Douglas Chief Strategy Officer, Raytheon, 9/13/2017
Comment2 comments  |  Read  |  Post a Comment
The 'Team of Teams' Model for Cybersecurity
Matthew Doan and Gary Barnabo, Commerical Cyber  Strategists, Booz Allen HamiltonCommentary
Security leaders can learn some valuable lessons from a real-life military model.
By Matthew Doan and Gary Barnabo Commerical Cyber Strategists, Booz Allen Hamilton, 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
Deception: A Convincing New Approach to Cyber Defense
Ofer Israeli, CEO & Founder, illusive networksCommentary
How defenders in a US national security agency capture-the-flag exercise used an endless stream of false data across the network to thwart attackers and contain damage.
By Ofer Israeli CEO & Founder, illusive networks, 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
Attacking Data Integrity & Hacking Radiation Monitoring Devices
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Ruben Santamarta shows radio-based vulnerabilities and investigates how the integrity of critical data can be manipulated to simulate, complicate or exacerbate emergency situations.
By Sara Peters Senior Editor at Dark Reading, 9/8/2017
Comment0 comments  |  Read  |  Post a Comment
Is Public Sector Cybersecurity Adequate?
Jonathan Couch, Senior VP of Strategy, ThreatQuotientCommentary
Many governmental organizations are unstaffed, underfunded, and unprepared to fight common attacks, and they could learn a thing or two from the private sector.
By Jonathan Couch Senior VP of Strategy, ThreatQuotient, 9/7/2017
Comment7 comments  |  Read  |  Post a Comment
Is Your Organization Merely PCI-Compliant or Is It Actually Secure?
Jeff Hussey, President & CEO, Tempered NetworksCommentary
The Host Identity Protocol might be the answer to inadequate check-the-box security standards.
By Jeff Hussey President & CEO, Tempered Networks, 9/6/2017
Comment0 comments  |  Read  |  Post a Comment
Activists Beware: The Latest In 3G & 4G Spying
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Ravi Borgaonkar describes new 3G & 4G vulnerabilities that enable IMSI catchers to be smarter, stealthier snoopers.
By Sara Peters Senior Editor at Dark Reading, 9/5/2017
Comment0 comments  |  Read  |  Post a Comment
3 Ways AI Could Help Resolve the Cybersecurity Talent Crisis
Todd Thibodeaux, President & CEO, CompTIACommentary
There's no escaping the fact that there's a skills shortage, and companies aren't doing enough to cultivate talent. AI could relieve some of the pressure.
By Todd Thibodeaux President & CEO, CompTIA, 9/5/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
Hyatt Hit With Another Credit Card Breach
Dark Reading Staff 10/13/2017
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.