DRTV

In Brief: The Unusual Suspects -- DeMystifying Attack Groups
In Brief: The Unusual Suspects -- DeMystifying Attack Groups
Dark Reading Videos  |  3/31/2016  | 
Your adversary is an imperfect human being. Use that knowledge to fight back.
In Brief: Using Offense To Create Best Defense
In Brief: Using Offense To Create Best Defense
Dark Reading Videos  |  3/25/2016  | 
Carbon Black execs talk about how their background in offensive security helps them think like attackers, and better defend against them.
The Threat Of Security Analytics Complexity
The Threat Of Security Analytics Complexity
Dark Reading Videos  |  3/23/2016  | 
Congratulations! You're protecting your organization with layered security...but now you're drowning in more security analytics data flows than you can handle.
In Brief: Securing IoT & Supporting Innovation
In Brief: Securing IoT & Supporting Innovation
Dark Reading Videos  |  3/23/2016  | 
CTO of BlueCat talks about how the Internet of Things pushes the boundaries of computing and how infosec pros can balance security and innovation.
In Brief: Fidelis CSO Talks Insider Threats, Detection Vs. Prevention
In Brief: Fidelis CSO Talks Insider Threats, Detection Vs. Prevention
Dark Reading Videos  |  3/22/2016  | 
Chief security officer of Fidelis Cybersecurity talks about the balancing act of both protecting the organization's insiders and protecting the organization from its insiders.
In Brief: Transforming SOCs to SICs
In Brief: Transforming SOCs to SICs
Dark Reading Videos  |  3/22/2016  | 
SPONSORED: Greg Boison, director of homeland and cybersecurity for Lockheed Martin, talks to Brian Gillooly at the RSA Conference about how to transform a security operations center into a security intelligence center, and Lockheed Martin's approach. See the full interview here.
Securing IoT & Supporting Innovation
Securing IoT & Supporting Innovation
Dark Reading Videos  |  3/3/2016  | 
Andrew Wertkin, CTO, BlueCat talks about how the Internet of Things pushes computing to the edge and how security must go out to meet it.
Using Offensive Security Mindset To Create Best Defense
Using Offensive Security Mindset To Create Best Defense
Dark Reading Videos  |  3/2/2016  | 
Carbon Black's CTO and chief security strategist talk about how their background in offensive security helps them think like attackers, and better defend against them.
Fidelis CSO Talks Insiders, Data Science, Encryption Backdoors, Kill Chain
Fidelis CSO Talks Insiders, Data Science, Encryption Backdoors, Kill Chain
Dark Reading Videos  |  3/2/2016  | 
The chief security officer of Fidelis Cybersecurity talks about managing insider risks, harnessing the power of metadata, and fending off attackers throughout the entire kill chain.
From SOC To SIC: Transforming Security Operations Centers
From SOC To SIC: Transforming Security Operations Centers
Dark Reading Videos  |  3/2/2016  | 
Lockheed Martin Director of Homeland and Cybersecurity Greg Boison talks about transforming the security operations center into the security intelligence center.
The Unusual Suspects: Demystifying Attack Groups Through Threat Intelligence
The Unusual Suspects: Demystifying Attack Groups Through Threat Intelligence
Dark Reading Videos  |  3/1/2016  | 
Colin McKinty, vice president of cybersecurity strategy, Americas, for BAE Systems talks about the importance of knowing your adversary.


WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Mirai Hackers' Sentence Includes No Jail Time
Dark Reading Staff 9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17243
PUBLISHED: 2018-09-20
Global Search in Zoho ManageEngine OpManager before 12.3 123205 allows SQL Injection.
CVE-2018-17232
PUBLISHED: 2018-09-20
SQL injection vulnerability in archivebot.py in docmarionum1 Slack ArchiveBot (aka slack-archive-bot) before 2018-09-19 allows remote attackers to execute arbitrary SQL commands via the text parameter to cursor.execute().
CVE-2018-17233
PUBLISHED: 2018-09-20
A SIGFPE signal is raised in the function H5D__create_chunk_file_map_hyper() of H5Dchunk.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack.
CVE-2018-17234
PUBLISHED: 2018-09-20
Memory leak in the H5O__chunk_deserialize() function in H5Ocache.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file.
CVE-2018-17235
PUBLISHED: 2018-09-20
The function mp4v2::impl::MP4Track::FinishSdtp() in mp4track.cpp in libmp4v2 2.1.0 mishandles compatibleBrand while processing a crafted mp4 file, which leads to a heap-based buffer over-read, causing denial of service.