Dark Reading Article Boards
Latest Message Boards
Page 1 / 2   >   >>
Write A Caption & Win A Prize
Last Message: 5/29/2017
 |  Comments: 119
Name That Toon: Screen Sharing
Last Message: 5/29/2017
 |  Comments: 49
WannaCry's 'Kill Switch' May Have Been a Sandbox-Evasion Tool
Last Message: 5/28/2017
 |  Comments: 3
Hackers Cash In On ATMs
Last Message: 5/28/2017
 |  Comments: 12
Hacker's Choice: Top Six Database Attacks
Last Message: 5/28/2017
 |  Comments: 1
Data Security & Privacy: The Risks of Not Playing by the Rules
Last Message: 5/28/2017
 |  Comments: 1
WannaCry Gives Consumers a First Look into Ransomware
Last Message: 5/27/2017
 |  Comments: 1
Split Tunnel SMTP Exploit Bypasses Email Security Gateways
Last Message: 5/27/2017
 |  Comments: 3
8 Most Overlooked Security Threats
Last Message: 5/26/2017
 |  Comments: 1
82% of Databases Left Unencrypted in Public Cloud
Last Message: 5/26/2017
 |  Comments: 2
5 Security Lessons WannaCry Taught Us the Hard Way
Last Message: 5/25/2017
 |  Comments: 8
Staying a Step Ahead of Internet Attacks
Last Message: 5/25/2017
 |  Comments: 2
8 Books Security Pros Should Read
Last Message: 5/25/2017
 |  Comments: 9
Unsanctioned Computer Support Costs Companies $88K per Year
Last Message: 5/25/2017
 |  Comments: 1
DDoS Attacks Fell 23% in First Quarter, Grew in Size
Last Message: 5/25/2017
 |  Comments: 2
4 Reasons the Vulnerability Disclosure Process Stalls
Last Message: 5/24/2017
 |  Comments: 1
The Sorry State Of Cybersecurity Awareness Training
Last Message: 5/24/2017
 |  Comments: 7
8 Notorious Russian Hackers Arrested in the Past 8 Years
Last Message: 5/24/2017
 |  Comments: 2
Don't Forget Basic Security Measures, Experts Say
Last Message: 5/24/2017
 |  Comments: 2
How Many People Does It Take to Defend a Network?
Last Message: 5/22/2017
 |  Comments: 2
Google Won't Trust Symantec and Neither Should You
Last Message: 5/22/2017
 |  Comments: 2
All Generations, All Risks, All Contained: A How-To Guide
Last Message: 5/22/2017
 |  Comments: 1
The Fundamental Flaw in TCP/IP: Connecting Everything
Last Message: 5/19/2017
 |  Comments: 4
"Data Theft Costs Tennessee Blue Cross Big Bucks"
Last Message: 5/19/2017
 |  Comments: 1
And Now a Ransomware Tool That Charges Based On Where You Live
Last Message: 5/19/2017
 |  Comments: 1
The Future Of ATM Hacking
Last Message: 5/18/2017
 |  Comments: 5
Inside the Motivations Behind Modern Cyberattackers
Last Message: 5/18/2017
 |  Comments: 1
The New Shadow IT: Custom Data Center Applications
Last Message: 5/18/2017
 |  Comments: 3
How to Integrate Threat Intel & DevOps
Last Message: 5/17/2017
 |  Comments: 1
Your Grandma Could Be the Next Ransomware Millionaire
Last Message: 5/17/2017
 |  Comments: 3
Understanding The Cloud Threat Surface
Last Message: 5/17/2017
 |  Comments: 10
Call Center Fraud Spiked 113% in 2016
Last Message: 5/17/2017
 |  Comments: 1
Study: Rooted Androids, Jailbroken iPhones Found in Enterprises
Last Message: 5/16/2017
 |  Comments: 1
The Cyber-Committed CEO & Board
Last Message: 5/16/2017
 |  Comments: 2
Seeing Security from the Other Side of the Window
Last Message: 5/16/2017
 |  Comments: 1
Microsoft Calls for IoT Cybersecurity Policy Development
Last Message: 5/16/2017
 |  Comments: 1
OWASP Top 10 Update: Long Overdue Or Same-Old, Same-Old?
Last Message: 5/14/2017
 |  Comments: 1
For The Birds: Dark Reading Cartoon Caption Contest Winners
Last Message: 5/14/2017
 |  Comments: 4
How To Stay Secure At The Hotel On A Business Trip
Last Message: 5/12/2017
 |  Comments: 10
Cisco Offers Free Decryption Tool For Ransomware Victims
Last Message: 5/12/2017
 |  Comments: 7
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.