var _hmt = _hmt || []; (function() { var hm = document.createElement("script"); hm.src = "https://hm.baidu.com/hm.js?d387e539c1f2d34f09a9afbac8032280"; var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(hm, s); })();

7x彩票网appDark Reading is part of the Informa Tech Division of Informa PLC

7x彩票网appThis site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary
Ransomware Victim Southwire Sues Maze Operators
Kelly Sheridan, Staff Editor, Dark ReadingNews
Attackers demanded $6 million from the wire and cable manufacturer when they launched a December ransomware campaign.
By Kelly Sheridan Staff Editor, Dark Reading, 1/3/2020
Comment2 comments  |  Read  |  Post a Comment
Cisco Drops a Dozen Vulnerability Patches
Dark Reading Staff, Quick Hits
Among them are three for critical authentication bypass flaws.
By Dark Reading Staff , 1/3/2020
Comment0 comments  |  Read  |  Post a Comment
The Edge Cartoon Caption Contest: Latest Winners, New Toon 'Like a Boss'
John Klossner, Cartoonist
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 1/3/2020
Comment5 comments  |  Read  |  Post a Comment
Malware Hits Travelex Currency Exchange Service
Dark Reading Staff, Quick Hits
The New Year's Eve malware attack forced Travelex employees to resort to manual operations.
By Dark Reading Staff , 1/3/2020
Comment2 comments  |  Read  |  Post a Comment
Continental Drift: Is Digital Sovereignty Splitting Global Data Centers?
Dark Reading Staff, News
The recent proposal by Germany, backed by France, to fuse the infrastructures of Europe's cloud providers could challenge every data center storing a European's data.
By Special to Dark Reading: Scott Fulton III, Data Center Knowledge , 1/3/2020
Comment0 comments  |  Read  |  Post a Comment
Organizations May 'Uncloud' Over Security, Budgetary Concerns
Matt Middleton-Leal, General Manager and Chief Security Strategist, NetwrixCommentary
While most cloud vendors forecast continued adoption and growth, some customers are taking a harder look at the cloud services they're using
By Matt Middleton-Leal General Manager and Chief Security Strategist, Netwrix, 1/3/2020
Comment0 comments  |  Read  |  Post a Comment
Time for Insider-Threat Programs to Grow Up
Robert Lemos, Contributing WriterNews
Immature programs attempting to protect against damaging attacks by insiders run the risk of alienating employees.
By Robert Lemos Contributing Writer, 1/2/2020
Comment2 comments  |  Read  |  Post a Comment
CCPA Kickoff: What Businesses Need to Know
Kelly Sheridan, Staff Editor, Dark ReadingNews
The California Consumer Privacy Act is in full effect, prompting organizations to think about how they'll remain compliant.
By Kelly Sheridan Staff Editor, Dark Reading, 1/2/2020
Comment0 comments  |  Read  |  Post a Comment
Ransomware Scuttles Coast Guard Facility for 30+ Hours
Dark Reading Staff, Quick Hits
The attack on the unnamed facility began with a malicious email link.
By Dark Reading Staff , 1/2/2020
Comment0 comments  |  Read  |  Post a Comment
Landry's Restaurant Chain Discloses Payment Security Incident
Dark Reading Staff, Quick Hits
Some payment cards were mistakenly swiped on order-entry systems that lacked the security of its point-of-sale terminals.
By Dark Reading Staff , 1/2/2020
Comment0 comments  |  Read  |  Post a Comment
How Cybersecurity's Metrics of Misery Fail to Describe Cybercrime Pain
Curtis Franklin Jr., Senior Editor at Dark Reading
Dollars lost and data records exposed are valuable measurements, but the true pain of a cybersecurity incident goes far beyond that. We asked infosec pros how they put words to the pain they feel when their defenses fall apart.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 1/2/2020
Comment0 comments  |  Read  |  Post a Comment
Mechanics of a Crypto Heist: How SIM Swappers Can Steal Cryptocurrency
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & PhelpsCommentary
The true vulnerability at the heart of SIM-swap attacks on crypto accounts lies in crypto exchanges' and email providers' variable implementation of 2FA.
By Nicole Sette Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps, 1/2/2020
Comment0 comments  |  Read  |  Post a Comment
6 Security Team Goals for DevSecOps in 2020
Ericka Chickowski, Contributing Writer
Huge opportunities await security teams that are finally ready move the needle on security problems that have plagued organizations for years.
By Ericka Chickowski Contributing Writer, 1/2/2020
Comment0 comments  |  Read  |  Post a Comment
Microsoft Shuts Down 50 Domains Used by North Korean Hacking Group
Dark Reading Staff, Quick Hits
'Thallium' nation-state threat group used the domains to target mostly US victims.
By Dark Reading Staff , 12/31/2019
Comment1 Comment  |  Read  |  Post a Comment
Operational Technology: Why Old Networks Need to Learn New Tricks
Derek Manky, Chief, Security Insights & Global Threat Alliances at Fortinet--Office of CISOCommentary
Cybercriminals are maximizing their opportunity by targeting older vulnerabilities in OT environments. It's time to fight back.
By Derek Manky Chief, Security Insights & Global Threat Alliances at Fortinet--Office of CISO, 12/31/2019
Comment0 comments  |  Read  |  Post a Comment
Cybercrime's Most Lucrative Careers
Joan Goodchild, Contributing Writer
Crime pays. Really well. Here's a look at just how much a cybercriminal can earn in a month.
By Joan Goodchild Contributing Writer, 12/31/2019
Comment0 comments  |  Read  |  Post a Comment
How AI and Cybersecurity Will Intersect in 2020
Ericka Chickowski, Contributing Writer
Understanding the new risks and threats posed by increased use of artificial intelligence.
By Ericka Chickowski Contributing Writer, 12/30/2019
Comment0 comments  |  Read  |  Post a Comment
Fraud in the New Decade
Emily Wilson, VP of Research at Terbium LabsCommentary
Like any enterprise that wants to survive, fraudsters and hackers will continue to build on past successes to fuel future growth
By Emily Wilson VP of Research at Terbium Labs, 12/30/2019
Comment1 Comment  |  Read  |  Post a Comment
The Coolest Hacks of 2019
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A FaceTime fail, weaponized sound, a 'Prying Eye,' and a wearable fingerprint ring, were among the more novel and odd hacks this year.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/30/2019
Comment3 comments  |  Read  |  Post a Comment
6 CISO New Year's Resolutions for 2020
Joan Goodchild, Contributing Writer
We asked chief information security officers how they plan to get their infosec departments in shape next year.
By Joan Goodchild Contributing Writer, 12/30/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by saigonnamphat
Current Conversations OK
In reply to: Re: Pending Review
Post Your Own Reply
More Conversations
PR Newswire
We asked chief information security officers how they plan to get their infosec departments in shape next year.
Knowing where your digital certificates are is just the start.
Phishing attacks require two things: a lure and a landing. This Akamai-sponsored report digs deep into how the phishing economy works and ways organizations can protect themselves from the ever-evolving threat.
Register for Dark Reading Newsletters
Cartoon
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database

PUBLISHED: 2020-01-06
IceWarp WebMail Server 12.2.0 and 12.1.x before 12.2.1.1 (and probably earlier versions) allows XSS (issue 1 of 2) in notes for contacts.

PUBLISHED: 2020-01-06
PHPGurukul Hospital Management System in PHP v4.0 suffers from multiple Persistent XSS vulnerabilities.

PUBLISHED: 2020-01-06
PHPGurukul Hospital Management System in PHP v4.0 suffers from multiple SQL injection vulnerabilities: multiple pages and parameters are not validating user input, and allow for the application's database and information to be fully compromised.

PUBLISHED: 2020-01-06
IceWarp WebMail Server 12.2.0 and 12.1.x before 12.2.1.1 (and probably earlier versions) allows XSS (issue 2 of 2) in notes for objects.

PUBLISHED: 2020-01-05
The Typesetter CMS 5.1 logout functionality is affected by a CSRF vulnerability. The logout function of the admin panel is not protected by any CSRF tokens. An attacker can logout the user using this vulnerability.
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Flash Poll
Video
Slideshows
7x彩票网app Feed
66˳Ʊ 7072Ʊ 7073Ʊַ 689Ʊ 963Ʊ 66˳Ʊַ 7073Ʊַ 7073Ʊע 66˳Ʊapp 8ŲʲƱapp