Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

News & Commentary
Power Outage Hits Millions in South America
Dark Reading Staff, Quick Hits
The outage, which is not (so far) seen as the result of a cyberattack, still had a significant impact on network and server availability.
By Dark Reading Staff , 6/17/2019
Comment0 comments  |  Read  |  Post a Comment
Utilities, Nations Need Better Plan Against Critical Infrastructure Attackers
Robert Lemos, Contributing WriterNews
The attackers behind the Triton, or Xenotime, intrusions into critical infrastructure (CI) safety systems are testing their skills against electric power companies. Options for defense are still limited, however.
By Robert Lemos Contributing Writer, 6/17/2019
Comment0 comments  |  Read  |  Post a Comment
10 Notable Security Acquisitions of 2019 (So Far)
Kelly Sheridan, Staff Editor, Dark Reading
In a year when security companies have been snapped up left and right, these deals stand out from the chaos.
By Kelly Sheridan Staff Editor, Dark Reading, 6/15/2019
Comment1 Comment  |  Read  |  Post a Comment
Sensory Overload: Filtering Out Cybersecurity's Noise
Joshua Goldfarb, Independent ConsultantCommentary
No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.
By Joshua Goldfarb Independent Consultant, 6/14/2019
Comment0 comments  |  Read  |  Post a Comment
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/13/2019
Comment2 comments  |  Read  |  Post a Comment
Cyberattack Hits Aircraft Parts Manufacturer
Dark Reading Staff, Quick Hits
Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear.
By Dark Reading Staff , 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
Google Adds Two-Factor Authentication For Its Apps on iOS
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Android-based two-factor authentication now works for Google applications on iPad and iPhone.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
The Rise of 'Purple Teaming'
Joseph R. Salazar, Technical Marketing EngineerCommentary
The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.
By Joseph R. Salazar Technical Marketing Engineer, 6/13/2019
Comment0 comments  |  Read  |  Post a Comment
Apple Pledges Privacy, Beefs Up Security
Robert Lemos, Contributing WriterNews
The company hits back at the data economy and fellow tech giants Facebook and Google by announcing its own single sign-on service. A host of other iterative security improvements are on their way as well.
By Robert Lemos Contributing Writer, 6/12/2019
Comment0 comments  |  Read  |  Post a Comment
DNS Observatory Offers Researchers New Insight into Global DNS Activity
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Among its early findings, 60% of the DNS transactions captured were handled by just 1,000 name servers.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/12/2019
Comment0 comments  |  Read  |  Post a Comment
Getting Up to Speed on Magecart
Casey Quinn, Associate, Newmeyer & DillionCommentary
Greater awareness of how Magecart works will give your company a leg up on the growing threat from this online credit card skimmer. Here are four places to start.
By Casey Quinn Associate, Newmeyer & Dillion, 6/11/2019
Comment0 comments  |  Read  |  Post a Comment
Voting Machine Vendor Shifts Gears & Pushes for Backup Paper Ballots
Dark Reading Staff, Quick Hits
Election Systems & Software will 'no longer sell paperless voting machines,' CEO said.
By Dark Reading Staff , 6/10/2019
Comment0 comments  |  Read  |  Post a Comment
End User Lockdown: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
Phishing, cybersecurity training, biometrics and casual Fridays. And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 6/7/2019
Comment2 comments  |  Read  |  Post a Comment
Cisco Buys Sentryo
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Cisco is adding the French company's network visibility products to its IoT network lineup.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/6/2019
Comment0 comments  |  Read  |  Post a Comment
Senior Executives More Involved with SOC Operations, Report Finds
Dark Reading Staff, Quick Hits
But they are still subject to the same alert fatigue and false-positive issues their junior employees face.
By Dark Reading Staff , 6/6/2019
Comment0 comments  |  Read  |  Post a Comment
Cyber Talent Gap? Don't Think Like Tinder!
Lysa Myers, Security Researcher, ESETCommentary
If your company truly is a great place to work, make sure your help-wanted ads steer clear of these common job-listing clichs.
By Lysa Myers Security Researcher, ESET, 6/6/2019
Comment0 comments  |  Read  |  Post a Comment
When Security Goes Off the Rails
Adam Shostack, Consultant, Entrepreneur, Technologist, Game DesignerCommentary
Cyber can learn a lot from the highly regulated world of rail travel. The most important lesson: the value of impartial analysis.
By Adam Shostack Consultant, Entrepreneur, Technologist, Game Designer, 6/6/2019
Comment0 comments  |  Read  |  Post a Comment
CISOs & CIOs: Better Together
Leo Taddeo, CISO, Cyxtera, and former FBI SAC of cyber and special operations for the NY region Commentary
An overview of three common organizational structures illustrates how NOT to pit chief security and IT execs against each other.
By Leo Taddeo CISO, Cyxtera, and former FBI SAC of cyber and special operations for the NY region , 6/5/2019
Comment0 comments  |  Read  |  Post a Comment
7 Container Components That Increase a Network's Security
Curtis Franklin Jr., Senior Editor at Dark Reading
A proof of concept at Interop19 showed just how simple a container deployment can be.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/4/2019
Comment0 comments  |  Read  |  Post a Comment
What Cyber Skills Shortage?
Andy Ellis, Chief Security Officer, AkamaiCommentary
Employers can solve the skills gap by first recognizing that there isn't an archetypal "cybersecurity job" in the same way that there isn't an archetypal "automotive job." Heres how.
By Andy Ellis Chief Security Officer, Akamai, 6/4/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by syekim13
Current Conversations Job Security
In reply to: Job Security
Post Your Own Reply
More Conversations
PR Newswire
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
10 Notable Security Acquisitions of 2019 (So Far)
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-9391
PUBLISHED: 2019-06-17
An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "request_image" as one of the s...
CVE-2017-9392
PUBLISHED: 2019-06-17
An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "request_image" as one of the s...
CVE-2018-18958
PUBLISHED: 2019-06-17
OPNsense 18.7.x before 18.7.7 has Incorrect Access Control.
CVE-2019-5016
PUBLISHED: 2019-06-17
An exploitable arbitrary memory read vulnerability exists in the KCodes NetUSB.ko kernel module which enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. A specially crafted index value can cause an invalid memory rea...
CVE-2019-5017
PUBLISHED: 2019-06-17
An exploitable information disclosure vulnerability exists in the KCodes NetUSB.ko kernel module that enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. An unauthenticated, remote attacker can craft and send a packet...