Upcoming Webinars
Webinar Archives
Stop Malware in its Tracks with Crowd-Sourced Threat Intelligence
Date: Dec 08, 2014
View webinar
Register for this webinar to join AlienVault VP of Product Strategy, Russ Spitler, and Systems Engineer, Tom D'Aquino for a practical session covering how to use crowd-sourced threat intelligence to improve network security.

Game Over for Gameover Zeus: Disrupting a Global Cybercriminal Operation
Date: Jul 31, 2014
View webinar
During this interactive webcast, Ben Feinstein, Director of CTU Operations and Development, will discuss details of the adversary?s operations and tradecraft behind Gameover Zeus and Operation Tovar. Ben will also share clear guidance on how to defend against similar threats in the future.

How to Increase Transactions per Second (TPS) with Flash Storage
Date: Jul 30, 2014
View webinar
Register for this webinar to learn how to allow your working dataset to expand beyond limited and expensive DRAM capacities into terabytes of lower cost flash storage, improving Transactions Per Second (TPS), per dollar, by up to four times.

How to Avoid the Seven Deadly Sins of Integration
Date: Jul 29, 2014
View webinar
Register for this webinar to hear from Peter Evans, BI Evangelist for Dell Software, who will discuss how you can discover and analyze new data without breaking the rules.

How to Avoid Cyber Attack Tools of the Trade
Date: Jul 29, 2014
View webinar
Register for this webinar to hear about real threats from a researcher who monitors malicious activity across a wide range of customer environments, from traditional data centers to the cloud, and ask him questions about the ever-evolving threat landscape.

Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

CVE-2014-3303
Published: 2014-07-28
The web framework in Cisco WebEx Meetings Server does not properly restrict the content of query strings, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history, aka Bug ID CSCuj81713.

CVE-2014-3304
Published: 2014-07-28
The OutlookAction Class in Cisco WebEx Meetings Server allows remote attackers to enumerate user accounts by entering crafted URLs and examining the returned messages, aka Bug ID CSCuj81722.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.