Attacks/Breaches

In Brief: Using Offense To Create Best Defense

50%
50%

SPONSORED: Mike Viscuso, CTO of Carbon Black, and Ben Johnson, Chief Security Strategist of Carbon Black talk to Brian Gilloly at the RSA Conference about how their background in offensive security helps them think like attackers, and better defend against them. For the full interview, see here.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
androidblender
50%
50%
androidblender,
User Rank: Apprentice
2/10/2017 | 9:14:14 AM
Great
nice
markstone
50%
50%
markstone,
User Rank: Apprentice
7/20/2016 | 12:57:37 AM
Re: Pending Review
great post nice
geoasroy
50%
50%
geoasroy,
User Rank: Apprentice
7/13/2016 | 2:09:39 AM
Re: Pending Review
great one dis
Kylenmackey
50%
50%
Kylenmackey,
User Rank: Apprentice
7/10/2016 | 3:10:45 AM
Re: Pending Review
NICE POST DIS ONE
joelcarroll
50%
50%
joelcarroll,
User Rank: Apprentice
7/9/2016 | 7:12:56 AM
Re: Pending Review
GOOD POST NICE
Allen aldridge
50%
50%
Allen aldridge,
User Rank: Apprentice
7/5/2016 | 5:44:34 AM
Re: Pending Review
nice post dis
sangwanlal
50%
50%
sangwanlal,
User Rank: Apprentice
7/2/2016 | 2:39:49 AM
Re: Pending Review
great post
rambirsinghpal
50%
50%
rambirsinghpal,
User Rank: Apprentice
6/30/2016 | 4:04:15 AM
Re: Pending Review
like dis post
salvimorrisjal
50%
50%
salvimorrisjal,
User Rank: Apprentice
6/29/2016 | 5:48:03 PM
Re: Pending Review
GOOD NICE POST
shankarmak
50%
50%
shankarmak,
User Rank: Apprentice
6/24/2016 | 5:49:36 PM
Re: Pending Review
nice post dis
Page 1 / 3   >   >>
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20168
PUBLISHED: 2018-12-17
Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service ("physical address not valid" panic) via a crafted application.
CVE-2018-20167
PUBLISHED: 2018-12-17
Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME typ...
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.