Attacks/Breaches

In Brief: Using Offense To Create Best Defense

50%
50%

SPONSORED: Mike Viscuso, CTO of Carbon Black, and Ben Johnson, Chief Security Strategist of Carbon Black talk to Brian Gilloly at the RSA Conference about how their background in offensive security helps them think like attackers, and better defend against them. For the full interview, see here.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
rambirsinghpal
50%
50%
rambirsinghpal,
User Rank: Apprentice
6/30/2016 | 4:04:15 AM
Re: Pending Review
like dis post
salvimorrisjal
50%
50%
salvimorrisjal,
User Rank: Apprentice
6/29/2016 | 5:48:03 PM
Re: Pending Review
GOOD NICE POST
shankarmak
50%
50%
shankarmak,
User Rank: Apprentice
6/24/2016 | 5:49:36 PM
Re: Pending Review
nice post dis
Sadanandwak
50%
50%
Sadanandwak,
User Rank: Apprentice
6/23/2016 | 3:53:43 PM
Re: Pending Review
GOOD ONE DIS
Tracyaustinmak
50%
50%
Tracyaustinmak,
User Rank: Apprentice
6/23/2016 | 4:16:50 AM
Re: Pending Review
gerat one
Cillyaussemak
50%
50%
Cillyaussemak,
User Rank: Apprentice
6/22/2016 | 4:25:45 AM
Re: Merger with Bit9
great one post
Juliealbeartmak
50%
50%
Juliealbeartmak,
User Rank: Apprentice
6/21/2016 | 6:22:18 AM
Re: Merger with Bit9
nice post good
Kyrgios
50%
50%
Kyrgios,
User Rank: Apprentice
6/10/2016 | 2:23:52 AM
Re: Merger with Bit9
GOOD ONE
swarajsoni
50%
50%
swarajsoni,
User Rank: Apprentice
4/23/2016 | 7:50:10 AM
Re: Merger with Bit9
nice post
sarrinodu
50%
50%
sarrinodu,
User Rank: Apprentice
4/18/2016 | 11:03:00 AM
Re: Merger with Bit9
nice post buddy thank for sharing
Page 1 / 2   >   >>
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers