Vulnerabilities / Threats

News & Commentary
Routing Security Gets Boost with New Set of MANRS for IXPs
Dark Reading Staff, Quick Hits
The Internet Society debuts a new mutually agreed norms initiative for IXPs.
By Dark Reading Staff , 4/26/2018
Comment0 comments  |  Read  |  Post a Comment
How Microsoft, Amazon, Alphabet Are Reshaping Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
Tech's biggest giants are shifting the cybersecurity landscape as they incorporate security into their products and services.
By Kelly Sheridan Staff Editor, Dark Reading, 4/26/2018
Comment0 comments  |  Read  |  Post a Comment
MyEtherWallet DNS Attack Offers Opt-In Lessons
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Attackers poisoned BGP route tables to redirect Amazon's Route 53 name servers to their malicious servers.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/26/2018
Comment0 comments  |  Read  |  Post a Comment
New Phishing Attack Targets 550M Email Users Worldwide
Dark Reading Staff, Quick Hits
In an attempt to steal financial data, the attack bribes users with coupons in exchange for taking an online quiz.
By Dark Reading Staff , 4/26/2018
Comment1 Comment  |  Read  |  Post a Comment
Why Hackers Love Healthcare
Allan Alford, Chief Information Security OfficerCommentary
The migration of valuable data to the cloud is piquing the interest of cybercrimimals. But there are ways to fight back.
By Allan Alford Chief Information Security Officer, 4/26/2018
Comment0 comments  |  Read  |  Post a Comment
The Default SAP Configuration That Every Enterprise Needs to Fix
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Nine out of ten organizations are vulnerable to a 13-year-old flaw that puts their most critical business systems at risk of complete criminal takeover.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/26/2018
Comment1 Comment  |  Read  |  Post a Comment
Free New Tool for Building Blockchain Skills
Dark Reading Staff, Quick Hits
Blockchain CTF helps pros build skills with simulations.
By Dark Reading Staff , 4/25/2018
Comment0 comments  |  Read  |  Post a Comment
Despite Risks, Nearly Half of IT Execs Don't Rethink Cybersecurity after an Attack
Marc Wilczek, Digital Strategist & CIO AdvisorCommentary
A recent survey reveals a troubling degree of security inertia lurking among scores of organizations. But there are a few bright spots.
By Marc Wilczek Digital Strategist & CIO Advisor, 4/25/2018
Comment1 Comment  |  Read  |  Post a Comment
'Webstresser' DDoS Attack Site Shut Down in International Operation
Kelly Sheridan, Staff Editor, Dark ReadingNews
Investigators arrested the admins of Webstresser, the world's largest DDoS marketplace reportedly responsible for more than four million attacks.
By Kelly Sheridan Staff Editor, Dark Reading, 4/25/2018
Comment0 comments  |  Read  |  Post a Comment
Why Information Integrity Attacks Pose New Security Challenges
Tamer Hassan, Co-Founder & CTO, White OpsCommentary
To fight information integrity attacks like the ones recently perpetrated by bots on the FCC's website, we need to change our stance and look for the adversaries hiding in plain sight.
By Tamer Hassan Co-Founder & CTO, White Ops, 4/25/2018
Comment0 comments  |  Read  |  Post a Comment
Low-Cost Crimeware Kit Gaining Popularity in Underground Markets
Jai Vijayan, Freelance writerNews
At $150 for a three-month subscription, Rubella Malware Builder presents a threat to enterprises, Flashpoint says.
By Jai Vijayan Freelance writer, 4/25/2018
Comment1 Comment  |  Read  |  Post a Comment
Diversity: It's About Inclusion
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Unrealistic entry-level job requirements, black-hoodie hacker image problems are among the 'uncomfortable conversations' needed to remedy cybersecurity's diversity gap.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/25/2018
Comment5 comments  |  Read  |  Post a Comment
Latest News from RSAC 2018
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive coverage of the news and security themes that dominated RSA Conference 2018 in San Francisco.
By Dark Reading Staff , 4/25/2018
Comment0 comments  |  Read  |  Post a Comment
Coviello: Modern Security Threats are 'Less About the Techniques'
Kelly Sheridan, Staff Editor, Dark ReadingNews
Today's attack surface is broader, more open, and demands a proactive approach to security, according to former RSA chairman Art Coviello.
By Kelly Sheridan Staff Editor, Dark Reading, 4/24/2018
Comment2 comments  |  Read  |  Post a Comment
Deconstructing the Possibilities and Realities of Enterprise IoT Security
Bill Kleyman, Chief Technology Officer, MTM TechnologiesCommentary
Organizations are rushing to leverage Internet of Things solutions but struggle to design the information technology architectures that will lock down the data these devices create.
By Bill Kleyman Chief Technology Officer, MTM Technologies, 4/24/2018
Comment2 comments  |  Read  |  Post a Comment
MEDantex Healthcare Transcription Firm Accidentally Exposes Medical Records
Kelly Sheridan, Staff Editor, Dark ReadingQuick Hits
Exposed data likely the result of a flawed system rebuild after a recent ransomware attack on the company.
By Kelly Sheridan Staff Editor, Dark Reading, 4/24/2018
Comment1 Comment  |  Read  |  Post a Comment
'Stresspaint' Targets Facebook Credentials
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
New malware variant goes after login credentials for popular Facebook pages.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
It's Time to Take GitHub Threats Seriously
Kumar Saurabh, CEO and co-founder of LogicHubCommentary
There's a good chance your company has projects on the source code management system, but the casual way many developers use GitHub creates security issues.
By Kumar Saurabh CEO and co-founder of LogicHub, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
Golden Galleon Raids Maritime Shipping Firms
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A new Nigerian criminal gang is launching attacks on the maritime industry.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 4/24/2018
Comment0 comments  |  Read  |  Post a Comment
Threat Intel: Finding Balance in an Overcrowded Market
Kelly Sheridan, Staff Editor, Dark ReadingNews
Industry insiders discuss how threat intelligence has changed and what may happen as the market becomes increasingly saturated.
By Kelly Sheridan Staff Editor, Dark Reading, 4/23/2018
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Diversity: It's About Inclusion
Kelly Jackson Higgins, Executive Editor at Dark Reading,  4/25/2018
Threat Intel: Finding Balance in an Overcrowded Market
Kelly Sheridan, Staff Editor, Dark Reading,  4/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.