Vulnerabilities / Threats //

Advanced Threats

News & Commentary
Attackers Aren't Invincible & We Must Use That to Our Advantage
Roselle Safran & Utpal Desai, President of Rosint Labs/Director of Product Management of BitdefenderCommentary
The bad guys only seem infallible. Use their weaknesses to beat them.
By Roselle Safran & Utpal Desai President of Rosint Labs/Director of Product Management of Bitdefender, 4/24/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft Windows, Antivirus Software at Odds After Latest Update
Robert Lemos, Technology Journalist/Data ResearcherNews
This month's Windows update has caused incompatibilities with software from at least five antivirus companies, resulting in slow boot times and frozen systems.
By Robert Lemos Technology Journalist/Data Researcher, 4/23/2019
Comment0 comments  |  Read  |  Post a Comment
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data ResearcherNews
Mueller report finds that in July 2016, after then-candidate Donald Trump publicly called for Russia to "find the 30,000 emails," Russian agents targeted Hillary Clinton's personal office with cyberattacks.
By Robert Lemos Technology Journalist/Data Researcher, 4/19/2019
Comment16 comments  |  Read  |  Post a Comment
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor NetworksCommentary
By blocking threats and attacks nearer to their sources, cybersecurity pros could help turn the connected world into a safer place for all.
By Darren Anstee Chief Technology Officer at Arbor Networks, 4/19/2019
Comment3 comments  |  Read  |  Post a Comment
GoT Guide to Cybersecurity: Preparing for Battle During a Staffing Shortage
Orion Cassetto, Senior Product Maester, ExabeamCommentary
Faced with an overwhelming adversary, Game of Thrones heroes Daenerys Targaryen and Jon Snow have a lot in common with today's beleaguered CISOs.
By Orion Cassetto Senior Product Maester, Exabeam, 4/18/2019
Comment1 Comment  |  Read  |  Post a Comment
Ever-Sophisticated Bad Bots Target Healthcare, Ticketing
Robert Lemos, Technology Journalist/Data ResearcherNews
From criminals to competitors, online bots continue to scrape information from sites and pose as legitimate users.
By Robert Lemos Technology Journalist/Data Researcher, 4/17/2019
Comment0 comments  |  Read  |  Post a Comment
Selecting the Right Strategy to Reduce Vulnerability Risk
Tim Erlin, VP of Product Management & Strategy at TripwireCommentary
There's no one-size-fits-all strategy for eliminating vulnerability risk. Knowing how your organization operates is what makes the difference.
By Tim Erlin VP of Product Management & Strategy at Tripwire, 4/17/2019
Comment0 comments  |  Read  |  Post a Comment
New Attacks (and Old Attacks Made New)
Derek Manky, Global Security Strategist, FortinetCommentary
Although new attacks might get the most attention, don't assume old ones have gone away.
By Derek Manky Global Security Strategist, Fortinet, 4/16/2019
Comment0 comments  |  Read  |  Post a Comment
Cloudy with a Chance of Security Breach
Ronan David, Chief Marketing Officer and Vice President of Business Development for EfficientIPCommentary
Businesses must be aware of the security weaknesses of the public cloud and not assume that every angle is covered.
By Ronan David Chief Marketing Officer and Vice President of Business Development for EfficientIP, 4/12/2019
Comment0 comments  |  Read  |  Post a Comment
New 'HOPLIGHT' Malware Appears in Latest North Korean Attacks, Say DHS, FBI
Robert Lemos, Technology Journalist/Data ResearcherNews
The FBI and Department of Homeland Security release malware analysis report, indicators of compromise for nine different executable files.
By Robert Lemos Technology Journalist/Data Researcher, 4/11/2019
Comment0 comments  |  Read  |  Post a Comment
Ignore the Insider Threat at Your Peril
Bryan Sartin, Executive Director, Global Security Services, at VerizonCommentary
Attacks from insiders often go undiscovered for months or years, so the potential impact can be huge. These 11 countermeasures can mitigate the damage.
By Bryan Sartin Executive Director, Global Security Services, at Verizon, 4/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Advanced Persistent Threat: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
From sushi and phishing to robots, passwords and ninjas -- and the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 4/5/2019
Comment0 comments  |  Read  |  Post a Comment
The Matrix at 20: A Metaphor for Today's Cybersecurity Challenges
Stephen Cox, VP & CSA, SecureAuthCommentary
The Matrix ushered in a new generation of sci-fi movies and futuristic plotlines with a relentless, seemingly invulnerable set of villains. Twenty years later, that theme is all too familiar to security pros.
By Stephen Cox VP & CSA, SecureAuth, 4/5/2019
Comment4 comments  |  Read  |  Post a Comment
Third Parties in Spotlight as More Facebook Data Leaks
Robert Lemos, Technology Journalist/Data ResearcherNews
Two third-party services left Facebook user data exposed online -- in one case, 540 million records of user comments -- highlighting the ease with which third-party developers can access data and the risk of lax security.
By Robert Lemos , 4/4/2019
Comment1 Comment  |  Read  |  Post a Comment
True Cybersecurity Means a Proactive Response
Liron Barak, CEO of BitDamCommentary
Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security.
By Liron Barak CEO of BitDam, 4/4/2019
Comment0 comments  |  Read  |  Post a Comment
Privacy & Regulatory Considerations in Enterprise Blockchain
Steve McNew, Senior Managing Director at FTI ConsultingCommentary
People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success.
By Steve McNew Senior Managing Director at FTI Consulting, 4/3/2019
Comment0 comments  |  Read  |  Post a Comment
Quantum Computing and Code-Breaking
Pankaj Parekh, Chief Product & Strategy Officer at SecurityFirstCommentary
Prepare today for the quantum threats of tomorrow.
By Pankaj Parekh Chief Product & Strategy Officer at SecurityFirst, 3/28/2019
Comment0 comments  |  Read  |  Post a Comment
Everything I Needed to Know About Third-Party Risk Management, I Learned from Meet the Parents
Brandon Dobrec, Senior Product Manager,  LookingGlass Cyber SolutionsCommentary
How much do you trust your vendors? You don't have to hook them up to a polygraph machine because there are better ways to establish trust.
By Brandon Dobrec Senior Product Manager, LookingGlass Cyber Solutions, 3/28/2019
Comment0 comments  |  Read  |  Post a Comment
Russia Regularly Spoofs Regional GPS
Robert Lemos, Technology Journalist/Data ResearcherNews
The nation is a pioneer in spoofing and blocking satellite navigation signals, causing more than 9,800 incidents in the past three years, according to an analysis of navigational data.
By Robert Lemos Technology Journalist/Data Researcher, 3/26/2019
Comment7 comments  |  Read  |  Post a Comment
Under Attack: Over Half of SMBs Breached Last Year
Marc Wilczek, Digital Strategist & CIO AdvisorCommentary
Many small and midsize businesses work faster and harder than large enterprises, but they're just as vulnerable to cybercrime.
By Marc Wilczek Digital Strategist & CIO Advisor, 3/26/2019
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11515
PUBLISHED: 2019-04-25
core/classes/db_backup.php in Gila CMS 1.10.1 allows admin/db_backup?download= absolute path traversal to read arbitrary files.
CVE-2019-11511
PUBLISHED: 2019-04-25
Zoho ManageEngine ADSelfService Plus before build 5708 has XSS via the mobile app API.
CVE-2019-11513
PUBLISHED: 2019-04-25
The File Manager in CMS Made Simple through 2.2.10 has Reflected XSS via the "New name" field in a Rename action.
CVE-2019-11514
PUBLISHED: 2019-04-25
User/Command/ConfirmEmailHandler.php in Flarum before 0.1.0-beta.8 mishandles invalidation of user email tokens.
CVE-2019-11506
PUBLISHED: 2019-04-24
In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to Expo...