Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

News & Commentary
With GDPR's 'Right of Access,' Who Really Has Access?
Kelly Sheridan, Staff Editor, Dark ReadingNews
How a security researcher learned organizations willingly hand over sensitive data with little to no identity verification.
By Kelly Sheridan Staff Editor, Dark Reading, 6/19/2019
Comment0 comments  |  Read  |  Post a Comment
Cost per Cyberattack Jumps to $4.6M in 2019
Dark Reading Staff, Quick Hits
From 2018 to 2019, the percentage of cyberattacks costing $10 million or more nearly doubled, hitting 13%.
By Dark Reading Staff , 6/19/2019
Comment1 Comment  |  Read  |  Post a Comment
How Hackers Emptied Church Coffers with a Simple Phishing Scam
Sam Bocetta, Security AnalystCommentary
Cyber thieves aren't bound by a code of ethics. They look for weak targets and high rewards, which is exactly what Saint Ambrose Catholic offered.
By Sam Bocetta Security Analyst, 6/19/2019
Comment0 comments  |  Read  |  Post a Comment
The Evolution of Identity
Kathleen Peters, SVP & Head of Fraud & Identity, ExperianCommentary
How data and technology can help businesses make the right fraud decisions, protect people's identities, and create an improved customer experience.
By Kathleen Peters SVP & Head of Fraud & Identity, Experian, 6/18/2019
Comment0 comments  |  Read  |  Post a Comment
Google Targets Deceptive Sites with New Chrome Tools
Dark Reading Staff, Quick Hits
A new extension and browser alert aim to help users report deceptive sites and prevent them from encountering fraud.
By Dark Reading Staff , 6/18/2019
Comment0 comments  |  Read  |  Post a Comment
Can Your Patching Strategy Keep Up with the Demands of Open Source?
 Tim Mackey, Principal Security Strategist, CyRC, at SynopsysCommentary
It's time to reassess your open source management policies and processes.
By Tim Mackey Principal Security Strategist, CyRC, at Synopsys, 6/18/2019
Comment4 comments  |  Read  |  Post a Comment
How Fraudulent Domains 'Hide in Plain Sight'
Kelly Sheridan, Staff Editor, Dark ReadingNews
Cybercriminals use new types of top-level domains, topical keywords, and targeted emails to trick victims into clicking malicious links.
By Kelly Sheridan Staff Editor, Dark Reading, 6/18/2019
Comment1 Comment  |  Read  |  Post a Comment
New Decryptor Unlocks Latest Versions of Gandcrab
Dark Reading Staff, Quick Hits
The decryptor neutralizes GandCrab versions 5.0 through 5.2 and lets victims unlock their files for free.
By Dark Reading Staff , 6/17/2019
Comment0 comments  |  Read  |  Post a Comment
10 Notable Security Acquisitions of 2019 (So Far)
Kelly Sheridan, Staff Editor, Dark Reading
In a year when security companies have been snapped up left and right, these deals stand out from the chaos.
By Kelly Sheridan Staff Editor, Dark Reading, 6/15/2019
Comment1 Comment  |  Read  |  Post a Comment
Congress Gives 'Hack Back' Legislation Another Try
Dark Reading Staff, Quick Hits
Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks.
By Dark Reading Staff , 6/13/2019
Comment1 Comment  |  Read  |  Post a Comment
The CISO's Drive to Consolidation
Nik Whitfield, Computer Scientist & Security Technology EntrepreneurCommentary
Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started.
By Nik Whitfield Computer Scientist & Security Technology Entrepreneur, 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
Google Adds Two-Factor Authentication For Its Apps on iOS
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Android-based two-factor authentication now works for Google applications on iPad and iPhone.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/13/2019
Comment1 Comment  |  Read  |  Post a Comment
CrowdStrike Prices IPO Above Range at $34
Kelly Sheridan, Staff Editor, Dark ReadingNews
The endpoint security firm raised $612 million ahead of today's public debut.
By Kelly Sheridan Staff Editor, Dark Reading, 6/12/2019
Comment0 comments  |  Read  |  Post a Comment
Microsoft Issues Fixes for 88 Vulnerabilities
Kelly Sheridan, Staff Editor, Dark ReadingNews
Four of the flaws are publicly known but none have been listed as under active attack.
By Kelly Sheridan Staff Editor, Dark Reading, 6/11/2019
Comment0 comments  |  Read  |  Post a Comment
Cognitive Bias Can Hamper Security Decisions
Kelly Sheridan, Staff Editor, Dark ReadingNews
A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes.
By Kelly Sheridan Staff Editor, Dark Reading, 6/10/2019
Comment1 Comment  |  Read  |  Post a Comment
GoldBrute Botnet Brute-Forcing 1.5M RDP Servers
Dark Reading Staff, Quick Hits
Botnets are scanning the Internet for servers exposing RDP and using weak, reused passwords to obtain access.
By Dark Reading Staff , 6/10/2019
Comment0 comments  |  Read  |  Post a Comment
Unmixed Messages: Bringing Security & Privacy Awareness Together
Tom Pendergast & Jeff Morgenroth, Chief Learning Officer at MediaPRO/Instructional Designer at MediaPROCommentary
Security and privacy share the same basic goals, so it just makes sense to combine efforts in those two areas. But that can be easier said than done.
By Tom Pendergast & Jeff Morgenroth Chief Learning Officer at MediaPRO/Instructional Designer at MediaPRO, 6/10/2019
Comment0 comments  |  Read  |  Post a Comment
End User Lockdown: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
Phishing, cybersecurity training, biometrics and casual Fridays. And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 6/7/2019
Comment2 comments  |  Read  |  Post a Comment
The Minefield of Corporate Email
Kelly Sheridan, Staff Editor, Dark ReadingNews
Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.
By Kelly Sheridan Staff Editor, Dark Reading, 6/7/2019
Comment3 comments  |  Read  |  Post a Comment
6 Security Scams Set to Sweep This Summer
Kelly Sheridan, Staff Editor, Dark Reading
Experts share the cybersecurity threats to watch for and advice to stay protected.
By Kelly Sheridan Staff Editor, Dark Reading, 6/6/2019
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Tim Mackey, Principal Security Strategist, CyRC, at Synopsys,  6/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-2729
PUBLISHED: 2019-06-19
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise ...
CVE-2019-3737
PUBLISHED: 2019-06-19
Dell EMC Avamar ADMe Web Interface 1.0.50 and 1.0.51 are affected by an LFI vulnerability which may allow a malicious user to download arbitrary files from the affected system by sending a specially crafted request to the Web Interface application.
CVE-2019-3787
PUBLISHED: 2019-06-19
Cloud Foundry UAA, versions prior to 73.0.0, falls back to appending ?unknown.org? to a user's email address when one is not provided and the user name does not contain an @ character. This domain is held by a private company, which leads to attack vectors including password recovery emails sent to ...
CVE-2019-12900
PUBLISHED: 2019-06-19
BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
CVE-2019-12893
PUBLISHED: 2019-06-19
Alternate Pic View 2.600 has a User Mode Write AV starting at PicViewer!PerfgrapFinalize+0x00000000000a8868.