Dark Reading Article Boards

Latest Message Boards
Page 1 / 2   >   >>
Worst Password Blunders of 2018 Hit Organizations East and West
Last Message: 12/19/2018
 |  Comments: 5
The Economics Fueling IoT (In)security
Last Message: 12/19/2018
 |  Comments: 2
"Hacking Higher Education"
Last Message: 12/19/2018
 |  Comments: 57
Paris Agreement on Cybercrime Falls Short of Unanimous Agreement
Last Message: 12/18/2018
 |  Comments: 1
6.4 Billion Fake Emails Sent Each Day
Last Message: 12/18/2018
 |  Comments: 1
8 Security Tips to Gift Your Loved Ones For the Holidays
Last Message: 12/18/2018
 |  Comments: 2
23,000 Compromised in HealthEquity Data Breach
Last Message: 12/18/2018
 |  Comments: 1
Oracle Issues Massive Collection of Critical Security Updates
Last Message: 12/18/2018
 |  Comments: 2
Sharpen Your Malware-Fighting Skills at Black Hat Europe
Last Message: 12/18/2018
 |  Comments: 2
Atrium Health Breach Exposes 2.65 Million Patient Records
Last Message: 12/18/2018
 |  Comments: 2
Microsoft Fixes 11 Critical, 39 Important Vulns
Last Message: 12/18/2018
 |  Comments: 2
How to Engage Your Cyber Enemies
Last Message: 12/18/2018
 |  Comments: 2
Audits: The Missing Layer in Cybersecurity
Last Message: 12/18/2018
 |  Comments: 2
2019 Attacker Playbook
Last Message: 12/18/2018
 |  Comments: 2
Google Patch to Block Spectre Slowdown in Windows 10
Last Message: 12/18/2018
 |  Comments: 4
New Bluetooth Hack Affects Millions of Vehicles
Last Message: 12/18/2018
 |  Comments: 5
Middle East, North Africa Cybercrime Ups Its Game
Last Message: 12/18/2018
 |  Comments: 2
California Enacts First-in-Nation IoT Security Law
Last Message: 12/18/2018
 |  Comments: 1
The Key to Stealing a Tesla Model S
Last Message: 12/18/2018
 |  Comments: 1
7 Variants (So Far) of Mirai
Last Message: 12/18/2018
 |  Comments: 1
FIFA Reveals Second Hack
Last Message: 12/18/2018
 |  Comments: 1
The Case for a Human Security Officer
Last Message: 12/18/2018
 |  Comments: 2
Fortinet Completes Bradford Networks Purchase
Last Message: 12/18/2018
 |  Comments: 2
Proving ROI: How a Security Road Map Can Sway the C-Suite
Last Message: 12/17/2018
 |  Comments: 1
8 Threats That Could Sink Your Company
Last Message: 12/17/2018
 |  Comments: 3
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Last Message: 12/15/2018
 |  Comments: 5
Boutique Malware & Hackers For Hire
Last Message: 12/14/2018
 |  Comments: 6
Name That Toon: I Spy
Last Message: 12/14/2018
 |  Comments: 76
Former NSO Group Employee Steals, Sells Spy Tools
Last Message: 12/14/2018
 |  Comments: 1
Toyota Builds Open-Source Car-Hacking Tool
Last Message: 12/14/2018
 |  Comments: 1
How to Find a Privacy Job That You'll Love (& Why)
Last Message: 12/14/2018
 |  Comments: 1
Uber Hit With $1.2 Million Additional Fines for 2016 Data Breach
Last Message: 12/14/2018
 |  Comments: 1
How Secure are our Voting Systems for November 2018?
Last Message: 12/14/2018
 |  Comments: 4
New Phishing Attack Targets 550M Email Users Worldwide
Last Message: 12/13/2018
 |  Comments: 8
39 Arrested in Tech Support Scam Crackdown: Microsoft
Last Message: 12/13/2018
 |  Comments: 4
Microsoft, PayPal, Google Top Phishing's Favorite Targets in Q3
Last Message: 12/12/2018
 |  Comments: 1
A Shift from Cybersecurity to Cyber Resilience: 6 Steps
Last Message: 12/12/2018
 |  Comments: 1
Checkmarx Acquires Custodela
Last Message: 12/11/2018
 |  Comments: 1
'PowerSnitch' Hacks Androids via Power Banks
Last Message: 12/11/2018
 |  Comments: 3
Anti-Botnet Guide Aims to Tackle Automated Threats
Last Message: 12/10/2018
 |  Comments: 1
Microsoft, Mastercard Aim to Change Identity Management
Last Message: 12/10/2018
 |  Comments: 8
6 CISO Resolutions for 2019
Last Message: 12/10/2018
 |  Comments: 1
Criminals Use Locally Connected Devices to Attack, Loot Banks
Last Message: 12/10/2018
 |  Comments: 1
Page 1 / 2   >   >>


Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
How to Engage Your Cyber Enemies
Guy Nizan, CEO at Intsights Cyber Intelligence,  12/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20228
PUBLISHED: 2018-12-19
Subsonic V6.1.5 allows internetRadioSettings.view streamUrl CSRF, with resultant SSRF.
CVE-2018-20230
PUBLISHED: 2018-12-19
An issue was discovered in PSPP 1.2.0. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
CVE-2018-20231
PUBLISHED: 2018-12-19
Cross Site Request Forgery (CSRF) in the two-factor-authentication plugin before 1.3.13 for WordPress allows remote attackers to disable 2FA via the tfa_enable_tfa parameter due to missing nonce validation.
CVE-2018-20227
PUBLISHED: 2018-12-19
RDF4J 2.4.2 allows Directory Traversal via ../ in an entry in a ZIP archive.
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...