Dark Reading Article Boards
Latest Message Boards
Page 1 / 2   >   >>
Name That Toon: Mobile (In)security
Last Message: 2/23/2017
 |  Comments: 53
80% Of Web Applications Contain At Least One Security Bug
Last Message: 2/22/2017
 |  Comments: 1
Google Shines Light On Corporate Gmail Threats
Last Message: 2/22/2017
 |  Comments: 2
Hackers Cash In On ATMs
Last Message: 2/22/2017
 |  Comments: 6
Recorded Future Talks Threat Intel
Last Message: 2/21/2017
 |  Comments: 1
Iran Intensifies Its Cyberattack Activity
Last Message: 2/21/2017
 |  Comments: 1
Clinton Campaign Tested Staffers With Fake Phishing Emails
Last Message: 2/21/2017
 |  Comments: 9
Cisco Offers Free Decryption Tool For Ransomware Victims
Last Message: 2/21/2017
 |  Comments: 6
Threat Hunting: Going After The Big Game
Last Message: 2/21/2017
 |  Comments: 4
Security Training 101: Stop Blaming The User
Last Message: 2/21/2017
 |  Comments: 1
You Can't Hire Your Way Out of a Skills Shortage ... Yet
Last Message: 2/21/2017
 |  Comments: 1
Talking Cybersecurity From A Risk Management Point of View
Last Message: 2/19/2017
 |  Comments: 5
How I Would Hack Your Network (If I Woke Up Evil)
Last Message: 2/19/2017
 |  Comments: 18
Yahoo Explains Cookie Forgery Related To Two 2016 Breaches
Last Message: 2/18/2017
 |  Comments: 1
'Shock & Awe' Ransomware Attacks Multiply
Last Message: 2/17/2017
 |  Comments: 2
Closing The Cybersecurity Skills Gap With STEM
Last Message: 2/17/2017
 |  Comments: 2
Android Security: 8 Signs Hackers Own Your Smartphone
Last Message: 2/17/2017
 |  Comments: 21
10 Essential Elements For Your Incident-Response Plan
Last Message: 2/17/2017
 |  Comments: 2
Microsoft Delays February Security Fixes
Last Message: 2/16/2017
 |  Comments: 1
Russian 'Fancy Bear' Hackers Hit Mac OS X With New Trojan
Last Message: 2/16/2017
 |  Comments: 1
Write A Caption & Win A Prize
Last Message: 2/16/2017
 |  Comments: 118
Ukraine Blames Russia For New Virus Targeting Infrastructure
Last Message: 2/16/2017
 |  Comments: 1
The Future Of ATM Hacking
Last Message: 2/15/2017
 |  Comments: 4
Hacking Group LulzSec Denies Arrest Report
Last Message: 2/15/2017
 |  Comments: 5
What We Mean by Maturity Models for Security
Last Message: 2/15/2017
 |  Comments: 2
When Hackers Hack Hackers
Last Message: 2/15/2017
 |  Comments: 2
Why Identity Has Become A Top Concern For CSOs
Last Message: 2/14/2017
 |  Comments: 1
Obama's Former Cybersecurity Coordinator Named President Of CTA
Last Message: 2/14/2017
 |  Comments: 1
Panasonic Inflight Entertainment System Vulnerable To Attack
Last Message: 2/14/2017
 |  Comments: 17
10 Password Managers For Business Use
Last Message: 2/13/2017
 |  Comments: 4
IBM Brings Watson Cognitive Computing To The SOC
Last Message: 2/13/2017
 |  Comments: 1
Fight Back Against Ransomware
Last Message: 2/10/2017
 |  Comments: 4
In Brief: Using Offense To Create Best Defense
Last Message: 2/10/2017
 |  Comments: 21
Startup Offers Free Cyberattack Simulation Service
Last Message: 2/9/2017
 |  Comments: 8
To Better Defend Yourself, Think Like A Hacker
Last Message: 2/9/2017
 |  Comments: 1
New Method Can Catch Smartphone Thieves In 14 Seconds
Last Message: 2/9/2017
 |  Comments: 1
Sophos Acquisition Targets Next-Gen Endpoint Security
Last Message: 2/9/2017
 |  Comments: 1
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.