Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

News & Commentary
The Life-Changing Magic of Tidying Up the Cloud
Kaus Phaltankar, CEO and Co-Founder at CaveonixCommentary
Most companies' cloud security operations would benefit significantly from clean-up, alignment, and organization.
By Kaus Phaltankar CEO and Co-Founder at Caveonix, 6/17/2019
Comment0 comments  |  Read  |  Post a Comment
10 Notable Security Acquisitions of 2019 (So Far)
Kelly Sheridan, Staff Editor, Dark Reading
In a year when security companies have been snapped up left and right, these deals stand out from the chaos.
By Kelly Sheridan Staff Editor, Dark Reading, 6/15/2019
Comment1 Comment  |  Read  |  Post a Comment
Common Hacker Tool Hit with Hackable Vulnerability
Dark Reading Staff, Quick Hits
A researcher has found a significant exploit in one of the most frequently used text editors.
By Dark Reading Staff , 6/14/2019
Comment0 comments  |  Read  |  Post a Comment
Google Adds Two-Factor Authentication For Its Apps on iOS
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Android-based two-factor authentication now works for Google applications on iPad and iPhone.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
DNS Observatory Offers Researchers New Insight into Global DNS Activity
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Among its early findings, 60% of the DNS transactions captured were handled by just 1,000 name servers.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/12/2019
Comment0 comments  |  Read  |  Post a Comment
Predicting Vulnerability Weaponization
Srinivas Mukkamala, Co-founder & CEO, RiskSenseCommentary
Advances in data science are making it possible to shift vulnerability management from a reactive to a proactive discipline.
By Srinivas Mukkamala Co-founder & CEO, RiskSense, 6/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Issues Fixes for 88 Vulnerabilities
Kelly Sheridan, Staff Editor, Dark ReadingNews
Four of the flaws are publicly known but none have been listed as under active attack.
By Kelly Sheridan Staff Editor, Dark Reading, 6/11/2019
Comment0 comments  |  Read  |  Post a Comment
FBI Warns of Dangers in 'Safe' Websites
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/11/2019
Comment1 Comment  |  Read  |  Post a Comment
Federal Photos Filched in Contractor Breach
Dark Reading Staff, Quick Hits
Data should never have been on subcontractor's servers, says Customs and Border Protection.
By Dark Reading Staff , 6/10/2019
Comment1 Comment  |  Read  |  Post a Comment
Voting Machine Vendor Shifts Gears & Pushes for Backup Paper Ballots
Dark Reading Staff, Quick Hits
Election Systems & Software will 'no longer sell paperless voting machines,' CEO said.
By Dark Reading Staff , 6/10/2019
Comment0 comments  |  Read  |  Post a Comment
Dark Web Becomes a Haven for Targeted Hits
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Malware on the Dark Web is increasingly being customized to target specific organizations and executives.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/7/2019
Comment2 comments  |  Read  |  Post a Comment
Vulnerability Found in Millions of Email Systems
Dark Reading Staff, Quick Hits
The vuln could allow remote execution of code with root privilege in more than 4.1 million systems.
By Dark Reading Staff , 6/7/2019
Comment2 comments  |  Read  |  Post a Comment
End User Lockdown: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
Phishing, cybersecurity training, biometrics and casual Fridays. And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 6/7/2019
Comment2 comments  |  Read  |  Post a Comment
How to Get the Most Benefits from Biometrics
Bojan Simic, Chief Technology Officer & Co-Founder of HYPRCommentary
Providing an easy-to-use, uniform authentication experience without passwords is simpler than you may think.
By Bojan Simic Chief Technology Officer & Co-Founder of HYPR, 6/5/2019
Comment2 comments  |  Read  |  Post a Comment
Adware Hidden in Android Apps Downloaded More Than 440 Million Times
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The heavily obfuscated adware was found in 238 different apps on Google Play.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/4/2019
Comment0 comments  |  Read  |  Post a Comment
7 Container Components That Increase a Network's Security
Curtis Franklin Jr., Senior Editor at Dark Reading
A proof of concept at Interop19 showed just how simple a container deployment can be.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/4/2019
Comment0 comments  |  Read  |  Post a Comment
Imperva Snaps Up Distil Networks for API, App Security
Dark Reading Staff, Quick Hits
Distil Networks' technology will be integrated into Imperva's security stack following the acquisition.
By Dark Reading Staff , 6/4/2019
Comment0 comments  |  Read  |  Post a Comment
What Cyber Skills Shortage?
Andy Ellis, Chief Security Officer, AkamaiCommentary
Employers can solve the skills gap by first recognizing that there isn't an archetypal "cybersecurity job" in the same way that there isn't an archetypal "automotive job." Heres how.
By Andy Ellis Chief Security Officer, Akamai, 6/4/2019
Comment1 Comment  |  Read  |  Post a Comment
New SOAP Attack Hits South African Home Routers
Curtis Franklin Jr., Senior Editor at Dark ReadingQuick Hits
A huge wave of attacks is targeting home routers in South Africa for recruitment into a Hakai-based botnet.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/31/2019
Comment0 comments  |  Read  |  Post a Comment
Checkers Breach Underscores Continued POS Dangers
Robert Lemos, Contributing WriterNews
Attacks on point-of-sale terminals garners less attention these days, but the most recent breach of the restaurant chain shows hackers have not lost focus.
By Robert Lemos Contributing Writer, 5/31/2019
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
10 Notable Security Acquisitions of 2019 (So Far)
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-9391
PUBLISHED: 2019-06-17
An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "request_image" as one of the s...
CVE-2017-9392
PUBLISHED: 2019-06-17
An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "request_image" as one of the s...
CVE-2018-18958
PUBLISHED: 2019-06-17
OPNsense 18.7.x before 18.7.7 has Incorrect Access Control.
CVE-2019-5016
PUBLISHED: 2019-06-17
An exploitable arbitrary memory read vulnerability exists in the KCodes NetUSB.ko kernel module which enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. A specially crafted index value can cause an invalid memory rea...
CVE-2019-5017
PUBLISHED: 2019-06-17
An exploitable information disclosure vulnerability exists in the KCodes NetUSB.ko kernel module that enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. An unauthenticated, remote attacker can craft and send a packet...