Operations

News & Commentary
10 Social Engineering Attacks Your End Users Need to Know About
Steve Zurier, Freelance Writer
It's Cybersecurity Awareness Month. Make sure your users are briefed on these 10 attacker techniques that are often overlooked.
By Steve Zurier Freelance Writer, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
What's Next after the SEC 'Insider Trading' Breach?
David L. Axelrod and Terence M. Grugan, Partner, Ballard SpahrCommentary
Last month's hack of the Security Exchange Commission may prove to be the most high-profile corporate gatekeeper attack to date. But it definitely won't be the last.
By David L. Axelrod and Terence M. Grugan Partner, Ballard Spahr, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
CISOs: Striving Toward Proactive Security Strategies
Mike Convertino, CISO & VP, Information Security, F5 Networks
A new survey paints a compelling picture of the modern security executive, how they succeed, and how much power they wield.
By Mike Convertino CISO & VP, Information Security, F5 Networks, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
Game Change: Meet the Mach37 Fall Startups
Ericka Chickowski, Contributing Writer, Dark Reading
CEOs describe how they think their fledgling ventures will revolutionize user training, privacy, identity management and embedded system security.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/18/2017
Comment1 Comment  |  Read  |  Post a Comment
What's Next After HTTPS: A Fully Encrypted Web?
Guy Podjarny, CEO & Cofounder, SnykCommentary
As the rate of HTTPS adoption grows faster by the day, it's only a matter of time before a majority of websites turn on SSL. Here's why.
By Guy Podjarny CEO & Cofounder, Snyk, 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
Banks Start Broad Use of Blockchain, as JP Morgan, IBM Lead Way
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Two major players announced cross-border payment networks built on blockchain technologies Monday, and more financial services will follow soon, despite opinions about Bitcoin.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLinkCommentary
The left side of the brain is logical and linear; the right side, creative. You have to use both sides of the brain to connect to your audience in your business.
By Bill Bradley SVP, Cyber Engineering and Technical Services, CenturyLink, 10/17/2017
Comment2 comments  |  Read  |  Post a Comment
US Supreme Court to Hear Microsoft-DOJ Email Case
Dark Reading Staff, Quick Hits
High court to rule on email privacy case, pitting Redmond giant against DOJ over access to its foreign-based email servers.
By Dark Reading Staff , 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
DHS to Require All Fed Agencies to Use DMARC, HTTPS, and STARTTLS
Dawn Kawamoto, Associate Editor, Dark ReadingNews
The move follows a DHS review of federal government agencies' steps to secure email and deploy authentication technologies.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
GDPR Compliance: 5 Early Steps to Get Laggards Going
Sara Peters, Senior Editor at Dark Reading
If you're just getting on the EU General Data Protection Regulation bandwagon, here's where you should begin.
By Sara Peters Senior Editor at Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRACommentary
As cybersecurity continues to become more of a mainstream concern, those of us who speak at industry events must learn how to truly connect with our audience.
By Joshua Goldfarb Co-founder & Chief Product Officer, IDDRA, 10/16/2017
Comment2 comments  |  Read  |  Post a Comment
Akamai Acquires Nominum
Dark Reading Staff, Quick Hits
Purchase of DNS and enterprise cybersecurity solutions company is designed to bolster Akamai's offering to telecom carriers.
By Dark Reading Staff , 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
Ransomware Sales on the Dark Web Spike 2,502% in 2017
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Sales soar to $6.2 million as do-it-yourself kits, ransomware-as-a-service, and distribution offerings take hold.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/11/2017
Comment1 Comment  |  Read  |  Post a Comment
Private, Public, or Hybrid? Finding the Right Fit in a Bug Bounty Program
Jason Haddix, Head of Trust & Security, BugcrowdCommentary
How can a bug bounty not be a bug bounty? There are several reasons. Here's why you need to understand the differences.
By Jason Haddix Head of Trust & Security, Bugcrowd, 10/5/2017
Comment1 Comment  |  Read  |  Post a Comment
DevOpsSec: A Big Step in Cloud Application Security
Jeff Schilling, Chief Security Officer, ArmorCommentary
Why it's time for DevOps and security teams to bury the hatchet -- and not in each other's back.
By Jeff Schilling Chief Security Officer, Armor, 10/3/2017
Comment0 comments  |  Read  |  Post a Comment
Analyzing Cybersecurity's Fractured Educational Ecosystem
Chaim Sanders, Security Lead at ZeroFOXCommentary
We have surprisingly little data on how to evaluate infosec job candidates academic qualifications. That needs to change.
By Chaim Sanders Security Lead at ZeroFOX, 9/29/2017
Comment5 comments  |  Read  |  Post a Comment
Equihax: Identifying & Wrangling Vulnerabilities
Nick Deshpande, VP, Product Development, ZenedgeCommentary
Now that we know what was taken from Equifax, how it was taken, and what is being sold, what more do we need to learn before the next time?
By Nick Deshpande VP, Product Development, Zenedge, 9/28/2017
Comment0 comments  |  Read  |  Post a Comment
7 SIEM Situations That Can Sack Security Teams
Dawn Kawamoto, Associate Editor, Dark Reading
SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/27/2017
Comment2 comments  |  Read  |  Post a Comment
Chevron's Jump to the Cloud is a Journey
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Enterprises entertaining a move to the cloud should brace themselves for a challenging path of discovery.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/26/2017
Comment0 comments  |  Read  |  Post a Comment
How Security Metrics Fail Us & How We Fail Them
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Joseph Carson of Thycotic discusses how infosec professionals buy security products they don't need and make other bad decisions, because of poor use of metrics.
By Sara Peters Senior Editor at Dark Reading, 9/26/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
Hyatt Hit With Another Credit Card Breach
Dark Reading Staff 10/13/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.