Flash Poll
Latest Content
Security Time
Flash Poll  |  4/14/2015  | 
Prepared for a Cyberattack?
Flash Poll  |  3/11/2015  | 
Eyes On The Analytics Prize
Flash Poll  |  3/1/2015  | 
Analyze This?
Flash Poll  |  2/1/2015  | 
Monitor Management
Flash Poll  |  1/2/2015  | 
Action Speaks Louder…
Flash Poll  |  1/1/2015  | 
Reliable Sources
Flash Poll  |  12/1/2014  | 
Defending Against Malware
Flash Poll  |  11/10/2014  | 
Intelligence Hired Guns?
Flash Poll  |  11/1/2014  | 
Breach Security 101
Flash Poll  |  10/21/2014  | 
Death of the Perimeter
Flash Poll  |  10/21/2014  | 
See Something, Say Something
Flash Poll  |  10/1/2014  | 
Bashed & Shellshocked
Flash Poll  |  9/30/2014  | 
Hacking Humans
Flash Poll  |  9/5/2014  | 
Security of 'Things'
Flash Poll  |  8/21/2014  | 
Security Org Chart
Flash Poll  |  7/18/2014  | 
Risk Management Report Card
Flash Poll  |  6/16/2014  | 
Greatest Threat
Flash Poll  |  6/4/2014  | 
Lessons Learned
Flash Poll  |  6/1/2014  | 
Cyber Security Skills
Flash Poll  |  5/29/2014  | 
Cyberbreach or Cyberrisk Insurance
Flash Poll  |  5/20/2014  | 
State of IT Security
Flash Poll  |  5/5/2014  | 
Broken Heartbeat
Flash Poll  |  4/10/2014  | 
Windows XP
Flash Poll  |  4/2/2014  | 
Safety Equipment
Flash Poll  |  11/15/2013  | 


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

CVE-2015-1486
Published: 2015-07-31
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote attackers to bypass authentication via a crafted password-reset action that triggers a new administrative session.

CVE-2015-1487
Published: 2015-07-31
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to write to arbitrary files, and consequently obtain administrator privileges, via a crafted filename.

CVE-2015-1488
Published: 2015-07-31
An unspecified action handler in the management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to read arbitrary files via unknown vectors.

CVE-2015-1489
Published: 2015-07-31
The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before 12.1-RU6-MP1 allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!