Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

News & Commentary
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark ReadingNews
A new report from Check Point recaps the cybercrime trends, statistics, and vulnerabilities that defined the security landscape in 2019.
By Kelly Sheridan Staff Editor, Dark Reading, 1/17/2020
Comment2 comments  |  Read  |  Post a Comment
7 Ways to Get the Most Out of a Penetration Test
Steve Zurier, Contributing Writer
You'll get the best results when youre clear on what you want to accomplish from a pen test.
By Steve Zurier Contributing Writer, 1/17/2020
Comment0 comments  |  Read  |  Post a Comment
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double OctopusCommentary
AD is still the single point of authentication for most companies that use Windows. But it has some shortcomings that should be addressed.
By Raz Rafaeli CEO and Co-Founder at Secret Double Octopus, 1/16/2020
Comment1 Comment  |  Read  |  Post a Comment
Google Lets iPhone Users Turn Device into Security Key
Kelly Sheridan, Staff Editor, Dark ReadingNews
The iPhone can now be used in lieu of a physical security key as a means of protecting Google accounts.
By Kelly Sheridan Staff Editor, Dark Reading, 1/15/2020
Comment1 Comment  |  Read  |  Post a Comment
How to Comprehend the Buzz About Honeypots
Curtis Franklin Jr., Senior Editor at Dark Reading
Honeypots are crucial tools for security researchers and security teams. Understanding what they are and what they can do can be critical for making them safe and useful for your organization.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 1/15/2020
Comment0 comments  |  Read  |  Post a Comment
How SD-WAN Helps Achieve Data Security and Threat Protection
Charuhas Ghatge, Senior Product and Solutions Marketing Manager at Nokia's Nuage NetworksCommentary
Enterprises currently consider the technology a best practice because of its flexibility, scalability, performance, and agility.
By Charuhas Ghatge Senior Product and Solutions Marketing Manager at Nokia's Nuage Networks, 1/15/2020
Comment0 comments  |  Read  |  Post a Comment
Google: Chrome Will Remove Third-Party Cookies and Tracking
Dark Reading Staff, Quick Hits
It's "not about blocking" but removing them altogether, the company said.
By Dark Reading Staff , 1/14/2020
Comment0 comments  |  Read  |  Post a Comment
Processor Vulnerabilities Put Virtual Workloads at Risk
Marc Laliberte, Senior Security Analyst, WatchGuard TechnologiesCommentary
Meltdown, Spectre exploits will likely lead to customers making tradeoffs between performance and security of applications, especially virtual and cloud-based apps
By Marc Laliberte Senior Security Analyst, WatchGuard Technologies, 1/14/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark ReadingNews
Windows 7 and Server 2008 will continue to work after Jan. 14, 2020, but will no longer receive security updates.
By Kelly Sheridan Staff Editor, Dark Reading, 1/13/2020
Comment2 comments  |  Read  |  Post a Comment
Study Points to Lax Focus on Cybersecurity
Dark Reading Staff, News
Despite ranking at the top of respondents' concerns, organizations still show gaps in acting on cybersecurity, Society for Information Management (SIM) report finds.
By Special to Dark Reading: Joao-Pierre S. Ruth, InformationWeek , 1/10/2020
Comment0 comments  |  Read  |  Post a Comment
AWS Issues 'Urgent' Warning for Database Users to Update Certs
Dark Reading Staff, Quick Hits
Users of AWS Aurora, DocumentDB, and RDS databases must download and install a fresh certificate and rotate the certificate authority.
By Dark Reading Staff , 1/9/2020
Comment1 Comment  |  Read  |  Post a Comment
Google's Project Zero Policy Change Mandates 90-Day Disclosure
Dark Reading Staff, Quick Hits
The updated disclosure policy aims to achieve more thorough and improved patch development, Google reports.
By Dark Reading Staff , 1/8/2020
Comment1 Comment  |  Read  |  Post a Comment
The "Art of Cloud War" for Business-Critical Data
Greg Jensen, Senior Director of Security at Oracle CorporationCommentary
How business executives' best intentions may be negatively affecting security and risk mitigation strategies -- and exposing weaknesses in organizational defenses.
By Greg Jensen Senior Director of Security at Oracle Corporation, 1/8/2020
Comment0 comments  |  Read  |  Post a Comment
Cloudflare Adds New Endpoint, Web Security Service
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
"Teams" and a new browser security acquisition expand the cloud firm's security offerings.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/7/2020
Comment0 comments  |  Read  |  Post a Comment
Mimecast Acquires Segasec to Boost Phishing Defense
Dark Reading Staff, Quick Hits
Segasec's technology will be integrated into Mimecast's email and Web security services to identify malicious domains.
By Dark Reading Staff , 1/6/2020
Comment0 comments  |  Read  |  Post a Comment
Continental Drift: Is Digital Sovereignty Splitting Global Data Centers?
Dark Reading Staff, News
The recent proposal by Germany, backed by France, to fuse the infrastructures of Europe's cloud providers could challenge every data center storing a European's data.
By Special to Dark Reading: Scott Fulton III, Data Center Knowledge , 1/3/2020
Comment0 comments  |  Read  |  Post a Comment
Organizations May 'Uncloud' Over Security, Budgetary Concerns
Matt Middleton-Leal, General Manager and Chief Security Strategist, NetwrixCommentary
While most cloud vendors forecast continued adoption and growth, some customers are taking a harder look at the cloud services they're using
By Matt Middleton-Leal General Manager and Chief Security Strategist, Netwrix, 1/3/2020
Comment0 comments  |  Read  |  Post a Comment
20 Vulnerabilities to Prioritize Patching Before 2020
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers list the top 20 vulnerabilities currently exploited by attack groups around the world.
By Kelly Sheridan Staff Editor, Dark Reading, 12/23/2019
Comment0 comments  |  Read  |  Post a Comment
F5 Pays $1 Billion for Shape
Dark Reading Staff, Quick Hits
The acquisition adds fraud detection and prevention to the application delivery company's tool collection.
By Dark Reading Staff , 12/20/2019
Comment0 comments  |  Read  |  Post a Comment
Google Cloud External Key Manager Now in Beta
Dark Reading Staff, Quick Hits
Cloud EKM is designed to separate data at rest from encryption keys stored in a third-party management system.
By Dark Reading Staff , 12/19/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.
CVE-2020-7222
PUBLISHED: 2020-01-18
An issue was discovered in Amcrest Web Server 2.520.AC00.18.R 2017-06-29 WEB 3.2.1.453504. The login page responds with JavaScript when one tries to authenticate. An attacker who changes the result parameter (to true) in this JavaScript code can bypass authentication and achieve limited privileges (...