Perimeter

News & Commentary
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark ReadingNews
In the weeks leading up to Valentine's Day 2019, researchers notice a new form of Gandcrab appearing in romance-themed emails.
By Kelly Sheridan Staff Editor, Dark Reading, 2/14/2019
Comment1 Comment  |  Read  |  Post a Comment
Security Spills: 9 Problems Causing the Most Stress
Kelly Sheridan, Staff Editor, Dark Reading
Security practitioners reveal what's causing them the most frustration in their roles.
By Kelly Sheridan Staff Editor, Dark Reading, 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
'Picnic' Passes Test for Protecting IoT From Quantum Hacks
Dark Reading Staff, Quick Hits
Researchers from DigiCert, Utimaco, and Microsoft Research gives thumbs-up to a new algorithm for implementing quantum hacking-proof digital certificates.
By Dark Reading Staff , 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
6 Reasons to Be Wary of Encryption in Your Enterprise
Curtis Franklin Jr., Senior Editor at Dark Reading
Encryption can be critical to data security, but it's not a universal panacea.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Malware Campaign Hides Ransomware in Super Mario Wrapper
Dark Reading Staff, Quick Hits
A newly discovered malware campaign uses steganography to hide GandCrab in a seemingly innocent Mario image.
By Dark Reading Staff , 2/8/2019
Comment4 comments  |  Read  |  Post a Comment
Carbonite Announces Webroot Purchase
Dark Reading Staff, Quick Hits
The purchase will add WebRoot's cloud-based security to the cloud-based data backup and recovery platform of Carbonite.
By Dark Reading Staff , 2/7/2019
Comment0 comments  |  Read  |  Post a Comment
Security Bugs in Video Chat Tools Enable Remote Attackers
Kelly Sheridan, Staff Editor, Dark ReadingNews
Lifesize is issuing a hotfix to address vulnerabilities in its enterprise collaboration devices, which could give hackers a gateway into target organizations.
By Kelly Sheridan Staff Editor, Dark Reading, 2/7/2019
Comment0 comments  |  Read  |  Post a Comment
When 911 Goes Down: Why Voice Network Security Must Be a Priority
Mykola Konrad, Vice President of Product Management, Ribbon CommunicationsCommentary
When there's a DDoS attack against your voice network, are you ready to fight against it?
By Mykola Konrad Vice President of Product Management, Ribbon Communications, 2/7/2019
Comment2 comments  |  Read  |  Post a Comment
DDoS Mitigation Pioneer Launches Network Security Startup
Dark Reading Staff, Quick Hits
Barrett Lyon is co-founder of Netography, which emerged today with $2.6M in seed funding from Andreessen Horowitz.
By Dark Reading Staff , 2/7/2019
Comment1 Comment  |  Read  |  Post a Comment
HelpSystems Buys Core Security Assets to Grow Infosec Portfolio
Dark Reading Staff, Quick Hits
Acquisition will enable it to provide threat detection, pen testing, and other security tools to customers.
By Dark Reading Staff , 2/6/2019
Comment1 Comment  |  Read  |  Post a Comment
Shellbot Crimeware Re-Emerges in Monero Mining Campaign
Kelly Sheridan, Staff Editor, Dark ReadingNews
New attack uses a repurposed version of the Trojan that spreads using Internet Relay Chat.
By Kelly Sheridan Staff Editor, Dark Reading, 2/5/2019
Comment0 comments  |  Read  |  Post a Comment
Taming the Wild, West World of Security Product Testing
Brian Monkman, Executive Director at NetSecOPENCommentary
The industry has long needed an open, industry-standard testing framework. NetSecOPEN is working to make that happen.
By Brian Monkman Executive Director at NetSecOPEN, 2/5/2019
Comment2 comments  |  Read  |  Post a Comment
Exposed Consumer Data Skyrocketed 126% in 2018
Kelly Sheridan, Staff Editor, Dark ReadingNews
The number of data breaches dropped overall, but the amount of sensitive records exposed jumped to 446.5 million last year, according to the ITRC.
By Kelly Sheridan Staff Editor, Dark Reading, 2/4/2019
Comment2 comments  |  Read  |  Post a Comment
6 Security Tips Before You Put a Digital Assistant to Work
Steve Zurier, Freelance Writer
If you absolutely have to have Amazon Alexa or Google Assistant in your home, heed the following advice.
By Steve Zurier Freelance Writer, 2/4/2019
Comment1 Comment  |  Read  |  Post a Comment
How Hackers Could Hit Super Bowl LIII
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security threats and concerns abound for the year's biggest football game. What officials and fans can do about it.
By Kelly Sheridan Staff Editor, Dark Reading, 2/1/2019
Comment1 Comment  |  Read  |  Post a Comment
Cisco Router Vulnerability Gives Window into Researchers' World
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The research around a recent vulnerability shows how researchers follow leads and find unexpected results.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 1/31/2019
Comment0 comments  |  Read  |  Post a Comment
Dell, CrowdStrike, Secureworks Join Forces to Secure Endpoints
Kelly Sheridan, Staff Editor, Dark ReadingNews
Dell SafeGuard and Response is geared toward businesses, governments, and schools that may lack resources they need to detect and remediate sophisticated threats.
By Kelly Sheridan Staff Editor, Dark Reading, 1/31/2019
Comment0 comments  |  Read  |  Post a Comment
Rubrik Data Leak is Another Cloud Misconfiguration Horror Story
Kelly Sheridan, Staff Editor, Dark ReadingNews
A server security mishap exposed vast stores of data belonging to clients of Rubrik, a security and cloud management firm.
By Kelly Sheridan Staff Editor, Dark Reading, 1/30/2019
Comment0 comments  |  Read  |  Post a Comment
Access Control Lists: 6 Key Principles to Keep in Mind
Curtis Franklin Jr., Senior Editor at Dark Reading
Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 1/30/2019
Comment1 Comment  |  Read  |  Post a Comment
Remote Access & the Diminishing Security Perimeter
Henry Harrison, Co-founder & Chief Technology Officer, GarrisonCommentary
Where security really matters, the enterprise is only as secure as the endpoints it allows to access its sensitive core systems.
By Henry Harrison Co-founder & Chief Technology Officer, Garrison, 1/29/2019
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by MelvinGray
Current Conversations Right
In reply to: Re: Pipes
Post Your Own Reply
More Conversations
PR Newswire
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8354
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
CVE-2019-8355
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
CVE-2019-8356
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
CVE-2019-8357
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.
CVE-2013-2516
PUBLISHED: 2019-02-15
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.