Vulnerabilities / Threats //

Vulnerability Management

News & Commentary
What Slugs in a Garden Can Teach Us About Security
Chris Nelson, Senior Director of Security and IT at Distil NetworksCommentary
Design principles observed in nature serve as a valuable model to improve organizations' security approaches.
By Chris Nelson Senior Director of Security and IT at Distil Networks, 12/8/2017
Comment0 comments  |  Read  |  Post a Comment
Rutkowska: Trust Makes Us Vulnerable
Kelly Sheridan, Associate Editor, Dark ReadingNews
Offensive security researcher Joanna Rutkowska explains why trust in technology can put users at risk.
By Kelly Sheridan Associate Editor, Dark Reading, 12/7/2017
Comment0 comments  |  Read  |  Post a Comment
6 Personality Profiles of White-Hat Hackers
Steve Zurier, Freelance Writer
From making the Internet safer to promoting their security careers, bug bounty hunters have a broad range of motivators for hacking most just like the challenge.
By Steve Zurier Freelance Writer, 12/5/2017
Comment0 comments  |  Read  |  Post a Comment
Deception: Why It's Not Just Another Honeypot
Carolyn Crandall, Chief Deception Officer at Attivo NetworksCommentary
The technology has made huge strides in evolving from limited, static capabilities to adaptive, machine learning deception.
By Carolyn Crandall Chief Deception Officer at Attivo Networks, 12/1/2017
Comment0 comments  |  Read  |  Post a Comment
The Critical Difference Between Vulnerabilities Equities & Threat Equities
Adam Shostack, Founder, Stealth StartupCommentary
Why the government has an obligation to share its knowledge of flaws in software and hardware to strengthen digital infrastructure in the face of growing cyberthreats.
By Adam Shostack Founder, Stealth Startup, 11/30/2017
Comment0 comments  |  Read  |  Post a Comment
8 Low or No-Cost Sources of Threat Intelligence
Steve Zurier, Freelance Writer
Heres a list of sites that for little or no cost give you plenty of ideas for where to find first-rate threat intelligence.
By Steve Zurier Freelance Writer, 11/27/2017
Comment2 comments  |  Read  |  Post a Comment
Frequent Software Releases, Updates May Injure App Security
Jai Vijayan, Freelance writerNews
The more frequently you release apps, the more security vulnerabilities you are likely to introduce in the code, a new study confirms.
By Jai Vijayan Freelance writer, 11/13/2017
Comment1 Comment  |  Read  |  Post a Comment
6 Steps for Sharing Threat Intelligence
Steve Zurier, Freelance Writer
Industry experts offer specific reasons to share threat information, why it's important - and how to get started.
By Steve Zurier Freelance Writer, 11/10/2017
Comment1 Comment  |  Read  |  Post a Comment
Siemens Teams Up with Tenable
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
ICS/SCADA vendor further extends its managed security services for critical infrastructure networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/8/2017
Comment0 comments  |  Read  |  Post a Comment
Inmarsat Disputes IOActive Reports of Critical Flaws in Ship SATCOM
Jai Vijayan, Freelance writerNews
Satellite communications provider says security firm's narrative about vulnerabilities in its AmosConnect 8 shipboard email service is overblown.
By Jai Vijayan Freelance writer, 10/26/2017
Comment0 comments  |  Read  |  Post a Comment
Why Patching Software Is Hard: Organizational Challenges
Teri Radichel, Director of Security Strategy and Research  at WatchGuard TechnologiesCommentary
The Equifax breach shows how large companies can stumble when it comes to patching. Organizational problems can prevent best practices from being enforced.
By Teri Radichel Director of Security Strategy and Research at WatchGuard Technologies, 10/25/2017
Comment0 comments  |  Read  |  Post a Comment
Why Patching Software Is Hard: Technical Challenges
Teri Radichel, Director of Security Strategy and Research  at WatchGuard TechnologiesCommentary
Huge companies like Equifax can stumble over basic technical issues. Here's why.
By Teri Radichel Director of Security Strategy and Research at WatchGuard Technologies, 10/24/2017
Comment6 comments  |  Read  |  Post a Comment
The Week in Crypto: Bad News for SSH, WPA2, RSA & Privacy
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Between KRACK, ROCA, new threats to SSH keys, and the European Commission's loosey-goosey stance on encryption backdoors, it's been a difficult time for cryptography.
By Dawn Kawamoto Associate Editor, Dark Reading, 10/20/2017
Comment0 comments  |  Read  |  Post a Comment
Oracle Fixes 20 Remotely Exploitable Java SE Vulns
Jai Vijayan, Freelance writerNews
Quarterly update for October is the smallest of the year: only 252 flaws to fix! Oracle advises to apply patches 'without delay.'
By Jai Vijayan Freelance writer, 10/18/2017
Comment0 comments  |  Read  |  Post a Comment
Reuters: Microsoft's 2013 Breach Hit Bug Repository, Insiders Say
Dark Reading Staff, Quick Hits
Five anonymous former Microsoft employees tell Reuters that Microsoft's database of internally discovered vulnerabilities was compromised in 2013, but Microsoft will not confirm it occurred.
By Dark Reading Staff , 10/17/2017
Comment0 comments  |  Read  |  Post a Comment
Private, Public, or Hybrid? Finding the Right Fit in a Bug Bounty Program
Jason Haddix, Head of Trust & Security, BugcrowdCommentary
How can a bug bounty not be a bug bounty? There are several reasons. Here's why you need to understand the differences.
By Jason Haddix Head of Trust & Security, Bugcrowd, 10/5/2017
Comment1 Comment  |  Read  |  Post a Comment
Security's #1 Problem: Economic Incentives
Dimitri Stiliadis, CEO of AporetoCommentary
The industry rewards cutting corners rather than making software safe. Case in point: the Equifax breach.
By Dimitri Stiliadis CEO of Aporeto, 9/25/2017
Comment18 comments  |  Read  |  Post a Comment
SecureAuth to Merge with Core Security
Dawn Kawamoto, Associate Editor, Dark ReadingNews
K1 Investment Management, which owns Core Security, plans to acquire the identity management and authentication company for more than $200 million.
By Dawn Kawamoto Associate Editor, Dark Reading, 9/20/2017
Comment1 Comment  |  Read  |  Post a Comment
The 'Team of Teams' Model for Cybersecurity
Matthew Doan and Gary Barnabo, Commerical Cyber  Strategists, Booz Allen HamiltonCommentary
Security leaders can learn some valuable lessons from a real-life military model.
By Matthew Doan and Gary Barnabo Commerical Cyber Strategists, Booz Allen Hamilton, 9/12/2017
Comment0 comments  |  Read  |  Post a Comment
How to Use Purple Teaming for Smarter SOCs
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Justin Harvey explains why the standard blue team vs. red team can be improved upon, and provides tips on doing purple teaming right.
By Sara Peters Senior Editor at Dark Reading, 9/7/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Oracle Product Rollout Underscores Need for Trust in the Cloud
Kelly Sheridan, Associate Editor, Dark Reading,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Gee, these virtual reality goggles work great!!! 
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.