Analytics

News & Commentary
Security Spills: 9 Problems Causing the Most Stress
Kelly Sheridan, Staff Editor, Dark Reading
Security practitioners reveal what's causing them the most frustration in their roles.
By Kelly Sheridan Staff Editor, Dark Reading, 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
2018 Was Second-Most Active Year for Data Breaches
Jai Vijayan, Freelance writerNews
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.
By Jai Vijayan Freelance writer, 2/13/2019
Comment1 Comment  |  Read  |  Post a Comment
Symantec Acquires Luminate to Build on Cloud Security
Dark Reading Staff, Quick Hits
Luminate Security, which specializes in software-defined perimeter technology, will extend Symantec's integrated defense platform.
By Dark Reading Staff , 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
How Hackers Could Hit Super Bowl LIII
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security threats and concerns abound for the year's biggest football game. What officials and fans can do about it.
By Kelly Sheridan Staff Editor, Dark Reading, 2/1/2019
Comment1 Comment  |  Read  |  Post a Comment
Dell, CrowdStrike, Secureworks Join Forces to Secure Endpoints
Kelly Sheridan, Staff Editor, Dark ReadingNews
Dell SafeGuard and Response is geared toward businesses, governments, and schools that may lack resources they need to detect and remediate sophisticated threats.
By Kelly Sheridan Staff Editor, Dark Reading, 1/31/2019
Comment0 comments  |  Read  |  Post a Comment
The Evolution of SIEM
Chetan Mundhada, Vice President of Sales at NETMONASTERYCommentary
Expectations for these security information and event management systems have grown over the years, in ways that just aren't realistic.
By Chetan Mundhada Vice President of Sales at NETMONASTERY, 1/23/2019
Comment0 comments  |  Read  |  Post a Comment
7 Business Metrics Security Pros Need to Know
Curtis Franklin Jr., Senior Editor at Dark Reading
These days, security has to speak the language of business. These KPIs will get you started.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 12/21/2018
Comment5 comments  |  Read  |  Post a Comment
How Well Is Your Organization Investing Its Cybersecurity Dollars?
Jack Jones, Chairman, FAIR InstituteCommentary
The principles, methods, and tools for performing good risk measurement already exist and are being used successfully by organizations today. They take some effort -- and are totally worth it.
By Jack Jones Chairman, FAIR Institute, 12/11/2018
Comment3 comments  |  Read  |  Post a Comment
Cyber Crooks Diversify Business with Multi-Intent Malware
Avi Chesla, CEO and Founder, empowCommentary
The makers of malware have realized that if they're going to invest time and money in compromising cyber defenses, they should do everything they can to monetize their achievement.
By Avi Chesla CEO and Founder, empow, 11/15/2018
Comment2 comments  |  Read  |  Post a Comment
7 Cool New Security Tools to be Revealed at Black Hat Europe
Ericka Chickowski, Contributing Writer, Dark Reading
Black Hat Europe's Arsenal lineup will include demoes of new security tools, from AI malware research to container orchestration.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/12/2018
Comment0 comments  |  Read  |  Post a Comment
Finding Gold in the Threat Intelligence Rush
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.
By Kelly Sheridan Staff Editor, Dark Reading, 11/7/2018
Comment0 comments  |  Read  |  Post a Comment
20 Cybersecurity Firms to Watch
Jai Vijayan, Freelance writer
A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.
By Jai Vijayan Freelance writer, 11/7/2018
Comment0 comments  |  Read  |  Post a Comment
Energy Sector's IT Networks in the Bulls-Eye
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Attackers are actively infiltrating energy organizations and utilities for reconnaissance purposes.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/5/2018
Comment0 comments  |  Read  |  Post a Comment
Thoma Bravo Buys Veracode
Kelly Sheridan, Staff Editor, Dark ReadingNews
Broadcom will sell Veracode, acquired last year by CA, for $950M to Thoma Bravo as it broadens its security portfolio.
By Kelly Sheridan Staff Editor, Dark Reading, 11/5/2018
Comment1 Comment  |  Read  |  Post a Comment
7 Non-Computer Hacks That Should Never Happen
Steve Zurier, Freelance Writer
From paper to IoT, security researchers offer tips for protecting common attack surfaces that you're probably overlooking.
By Steve Zurier Freelance Writer, 11/5/2018
Comment3 comments  |  Read  |  Post a Comment
Symantec Acquires Appthority And Javelin Networks
Dark Reading Staff, Quick Hits
Both buys bolster the cybersecurity company's endpoint security business.
By Dark Reading Staff , 11/5/2018
Comment1 Comment  |  Read  |  Post a Comment
Apple Patches Multiple Major Security Flaws
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
New security updates cross all Apple platforms.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 10/31/2018
Comment1 Comment  |  Read  |  Post a Comment
Qualys Snaps Up Container Firm
Dark Reading Staff, Quick Hits
Plans to use Layered Insight's technology to add runtime capabilities and automated enforcement to its container security tool.
By Dark Reading Staff , 10/31/2018
Comment0 comments  |  Read  |  Post a Comment
9 Traits of A Strong Infosec Resume
Kelly Sheridan, Staff Editor, Dark Reading
Security experts share insights on which skills and experiences are most helpful to job hunters looking for their next gig.
By Kelly Sheridan Staff Editor, Dark Reading, 10/31/2018
Comment1 Comment  |  Read  |  Post a Comment
Windows Defender: First Full Antivirus Tool to Run in a Sandbox
Kelly Sheridan, Staff Editor, Dark ReadingNews
Sandboxed version now available to Windows Insiders and anyone else who force-enables it in Windows 10 version 1703 and above.
By Kelly Sheridan Staff Editor, Dark Reading, 10/29/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by nicfaust
Current Conversations Interesting post. Thank you.
In reply to: Hi!
Post Your Own Reply
Posted by sharmapriya
Current Conversations I really like your work...
In reply to: Very Nice
Post Your Own Reply
More Conversations
PR Newswire
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8354
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
CVE-2019-8355
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
CVE-2019-8356
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
CVE-2019-8357
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.
CVE-2013-2516
PUBLISHED: 2019-02-15
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.