Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

News & Commentary
European Central Bank Website Hit by Malware Attack
Dark Reading Staff, Quick Hits
The website was infected with malware that stole information on subscribers to a bank newsletter.
By Dark Reading Staff , 8/16/2019
Comment1 Comment  |  Read  |  Post a Comment
7 Biggest Cloud Security Blind Spots
Ericka Chickowski, Contributing Writer
Cloud computing boon is for innovation, yet security organizations find themselves running into obstacles.
By Ericka Chickowski Contributing Writer, 8/15/2019
Comment0 comments  |  Read  |  Post a Comment
Why Companies Fail to Learn from Peers' Mistakes (and How They Can Change)
Anurag Kahol, CTO, BitglassCommentary
Far too often, there's a new breach in the headlines. Companies need to start learning some obvious lessons.
By Anurag Kahol CTO, Bitglass, 8/14/2019
Comment1 Comment  |  Read  |  Post a Comment
Microservices Flip App Security on Its Head
Jonathan DiVincenzo, Head of Product at Signal SciencesCommentary
With faster application deployment comes increased security considerations.
By Jonathan DiVincenzo Head of Product at Signal Sciences, 8/14/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark ReadingNews
Similar to the now-patched 'BlueKeep' vulnerability, two flaws fixed today could let malware spread across vulnerable computers.
By Kelly Sheridan Staff Editor, Dark Reading, 8/13/2019
Comment3 comments  |  Read  |  Post a Comment
700K Guest Records Stolen in Choice Hotels Breach
Dark Reading Staff, Quick Hits
Cybercriminals reportedly stole the information from an exposed MongoDB database on a third-party server.
By Dark Reading Staff , 8/13/2019
Comment2 comments  |  Read  |  Post a Comment
History Doesn't Repeat Itself in Cyberspace
Nick Jovanovic, VP, Federal, for Cloud Protection and Licensing Activity at ThalesCommentary
The 10th anniversary of the US Cyber Command is an opportunity to prepare for unknowns in the rapidly changing cybersecurity landscape.
By Nick Jovanovic VP, Federal, for Cloud Protection and Licensing Activity at Thales, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
Moving on Up: Ready for Your Apps to Live in the Cloud?
Kacy Zurkus, Contributing Writer
Among the complications: traditional security tools work poorly or not at all in the cloud, and if a company screws up, the whole Internet will know.
By Kacy Zurkus Contributing Writer, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
DEF CON Voting Village: It's About 'Risk'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
DHS, security experts worry about nation-state or other actors waging a disruptive or other attack on the 2020 election to sow distrust of the election process.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2019
Sara Peters, Senior Editor at Dark ReadingNews
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
By Sara Peters Senior Editor at Dark Reading, 8/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Enterprises Must Be Wary of Ransomware Targeting Network File Shares & Cloud Assets
Ericka Chickowski, Contributing WriterNews
New research shows that criminals are evolving ransomware attacks against servers, network hosts, and IaaS cloud assets in search of bigger payoffs from businesses.
By Ericka Chickowski Contributing Writer, 8/7/2019
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Opens Azure Security Lab, Raises Top Azure Bounty to $40K
Kelly Sheridan, Staff Editor, Dark ReadingNews
Microsoft has invited security experts to 'come and do their worst' to mimic cybercriminals in the Azure Security Lab.
By Kelly Sheridan Staff Editor, Dark Reading, 8/5/2019
Comment0 comments  |  Read  |  Post a Comment
Capital One: What We Should Learn This Time
Kelly Sheridan, Staff Editor, Dark ReadingNews
Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.
By Kelly Sheridan Staff Editor, Dark Reading, 8/2/2019
Comment2 comments  |  Read  |  Post a Comment
Google Cloud Debuts New Security Capabilities
Dark Reading Staff, Quick Hits
Updates include Advanced Protection Program for the enterprise and general availability of password vaulted apps in Cloud Identity and G Suite.
By Dark Reading Staff , 7/31/2019
Comment3 comments  |  Read  |  Post a Comment
Why the Network Is Central to IoT Security
Jon Green, President & CTO for Security at Aruba Networks, a Hewlett Packard EnterpriseCommentary
Is there something strange about your network activity? Better make sure all of your IoT devices are under control.
By Jon Green President & CTO for Security at Aruba Networks, a Hewlett Packard Enterprise, 7/31/2019
Comment1 Comment  |  Read  |  Post a Comment
Former Twitter CISO Launches Startup to Secure Cloud Collaboration
Kelly Sheridan, Staff Editor, Dark ReadingNews
Altitude Networks, led by Michael Coates and Amir Kavousian, aims to prevent accidental and malicious file sharing.
By Kelly Sheridan Staff Editor, Dark Reading, 7/31/2019
Comment0 comments  |  Read  |  Post a Comment
Container Security Is Falling Behind Container Deployments
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Organizations are increasingly turning to containers even though they are not as confident in the security of those containers, according to a new survey.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/30/2019
Comment1 Comment  |  Read  |  Post a Comment
Capital One Breach Affects 100M US Citizens, 6M Canadians
Kelly Sheridan, Staff Editor, Dark ReadingNews
The breach exposed credit card application data, Social Security numbers, and linked bank accounts, among other information.
By Kelly Sheridan Staff Editor, Dark Reading, 7/30/2019
Comment10 comments  |  Read  |  Post a Comment
Suffering SOC Saga Continues
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New study exposes low confidence among security professionals in their security operations centers.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/30/2019
Comment0 comments  |  Read  |  Post a Comment
CISOs Must Evolve to a Data-First Security Program
Michael Coates, CEO & Co-Founder of Altitude NetworksCommentary
Such a program will require effort and reprioritization, but it will let your company fight modern-day threats and protect your most important assets.
By Michael Coates CEO & Co-Founder of Altitude Networks, 7/30/2019
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by andrew898
Current Conversations Nice post. 
In reply to: Cybercrime
Post Your Own Reply
Posted by allenred
Current Conversations nice post
In reply to: cyber security
Post Your Own Reply
More Conversations
PR Newswire
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15160
PUBLISHED: 2019-08-19
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
CVE-2019-15150
PUBLISHED: 2019-08-19
In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
CVE-2017-18550
PUBLISHED: 2019-08-19
An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_get_hba_info does not initialize the hbainfo structure.
CVE-2017-18551
PUBLISHED: 2019-08-19
An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
CVE-2017-18552
PUBLISHED: 2019-08-19
An issue was discovered in net/rds/af_rds.c in the Linux kernel before 4.11. There is an out of bounds write and read in the function rds_recv_track_latency.