Risk

News & Commentary
What's Next after the SEC 'Insider Trading' Breach?
David L. Axelrod and Terence M. Grugan, Partner, Ballard SpahrCommentary
Last month's hack of the Security Exchange Commission may prove to be the most high-profile corporate gatekeeper attack to date. But it definitely won't be the last.
By David L. Axelrod and Terence M. Grugan Partner, Ballard Spahr, 10/19/2017
Comment0 comments  |  Read  |  Post a Comment
What's Next After HTTPS: A Fully Encrypted Web?
Guy Podjarny, CEO & Cofounder, SnykCommentary
As the rate of HTTPS adoption grows faster by the day, it's only a matter of time before a majority of websites turn on SSL. Here's why.
By Guy Podjarny CEO & Cofounder, Snyk, 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
Banks Start Broad Use of Blockchain, as JP Morgan, IBM Lead Way
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Two major players announced cross-border payment networks built on blockchain technologies Monday, and more financial services will follow soon, despite opinions about Bitcoin.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Reuters: Microsoft's 2013 Breach Hit Bug Repository, Insiders Say
Dark Reading Staff, Quick Hits
Five anonymous former Microsoft employees tell Reuters that Microsoft's database of internally discovered vulnerabilities was compromised in 2013, but Microsoft will not confirm it occurred.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
ATM Machine Malware Sold on Dark Web
Dark Reading Staff, Quick Hits
Cybercriminals are advertising ATM malware that's designed to exploit hardware and software vulnerabilities on the cash-dispensing machines.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Google Bolsters Security for Select Groups
Dark Reading Staff, Quick Hits
Business leaders, political campaign teams, journalists, and other high-risk groups will receive advanced email and account protection.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
InfoSec Pros Among Worst Offenders of Employer Snooping
Dawn Kawamoto, Associate Editor, Dark ReadingNews
A majority of IT security professionals admit to trolling through company information unrelated to their work -- even sensitive material.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/17/2017
Comment1 Comment  |  Read  |  Post a Comment
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLinkCommentary
The left side of the brain is logical and linear; the right side, creative. You have to use both sides of the brain to connect to your audience in your business.
By Bill Bradley SVP, Cyber Engineering and Technical Services, CenturyLink, 10/17/2017
Comment2 comments  |  Read  |  Post a Comment
New Cybercrime Campaign a 'Clear and Imminent' Threat to Banks Worldwide
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Hundreds of millions of dollars stolen from banks via an sophisticated attack that blended cyber and physical elements.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
GDPR Compliance: 5 Early Steps to Get Laggards Going
Sara Peters, Senior Editor at Dark Reading
If you're just getting on the EU General Data Protection Regulation bandwagon, here's where you should begin.
By Sara Peters Senior Editor at Dark Reading, 10/16/2017
Comment0 comments  |  Read  |  Post a Comment
Hyatt Hit With Another Credit Card Breach
Dark Reading Staff, Quick Hits
Payment card information stolen when cards were either swiped or manually entered into registration systems at some Hyatt hotels.
By Dark Reading Staff , 10/13/2017
Comment2 comments  |  Read  |  Post a Comment
Coalition to Offer Free Business Email Compromise Workshops
Dark Reading Staff, Quick Hits
A coalition of federal law enforcement agencies, ISACs, and Symantec will offer BEC workshops in a dozen cities.
By Dark Reading Staff , 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
Equifax Now Faces Potential Breach of Customer Help Page
Dark Reading Staff, Quick Hits
Embattled credit-monitoring company takes down help page that reportedly redirects users to download a bogus software update.
By Dark Reading Staff , 10/12/2017
Comment2 comments  |  Read  |  Post a Comment
Olympic Games Face Greater Cybersecurity Risks
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Cybercriminals may alter score results and engage in launching physical attacks at future Olympic Games, a recently released report warns.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/12/2017
Comment0 comments  |  Read  |  Post a Comment
IoT: Insecurity of Things or Internet of Threats?
Kelly Sheridan, Associate Editor, Dark ReadingNews
Security leaders call for device manufacturers to buckle down on device security as the Internet of Things evolves.
By Kelly Sheridan Associate Editor, Dark Reading, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
New Dark Reading Conference Will Focus on Defense
Dark Reading Staff, Commentary
The INsecurity Conference, Nov. 29-30 at the Gaylord National Harbor in Maryland is all about helping infosecurity pros mitigate threats -- from hot topics to basic hygiene.
By Dark Reading Staff , 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
Ransomware Sales on the Dark Web Spike 2,502% in 2017
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Sales soar to $6.2 million as do-it-yourself kits, ransomware-as-a-service, and distribution offerings take hold.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/11/2017
Comment1 Comment  |  Read  |  Post a Comment
GDPR Concerns Include 'Where's My Data Stored?'
Ericka Chickowski, Contributing Writer, Dark ReadingNews
European data protection regulations are coming like a freight train and many firms are still unprepared.
By Ericka Chickowski Contributing Writer, Dark Reading, 10/11/2017
Comment0 comments  |  Read  |  Post a Comment
DevOpsSec: A Big Step in Cloud Application Security
Jeff Schilling, Chief Security Officer, ArmorCommentary
Why it's time for DevOps and security teams to bury the hatchet -- and not in each other's back.
By Jeff Schilling Chief Security Officer, Armor, 10/3/2017
Comment0 comments  |  Read  |  Post a Comment
70% of US Employees Lack Security and Privacy Awareness
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Acceptable use of social media and adherence to workplace physical security drops, new survey shows.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/3/2017
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
Hyatt Hit With Another Credit Card Breach
Dark Reading Staff 10/13/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.