Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

Most Commented Content posted in August 2015
Cybersecurity Under FTC Authority: What Does it Mean?
Commentary  |  8/27/2015  | 
Consumers can now expect the same level of security and privacy in the digital realm as they do in the physical.
RASP: A False Sense of Security For Apps & Data
Commentary  |  8/17/2015  | 
Betting on a single runtime tool like RASP is not the solution for eliminating application security risk.
Mad World: The Truth About Bug Bounties
Commentary  |  8/13/2015  | 
What Oracle CSO Mary Ann Davidson doesnt get about modern security vulnerability disclosure.
Breaking Honeypots For Fun And Profit
Commentary  |  8/3/2015  | 
As a concept, honeypots can be a powerful tool for detecting malware. But in the emerging field of cyber deception, theyre not up to the task of fooling attackers and getting our hands on their resources.
The 7 Most Common RATS In Use Today
Commentary  |  8/28/2015  | 
Sniffing out RATS -- remote access Trojans -- is a challenge for even the most hardened cyber defender. Heres a guide to help you in the hunt.
Keyless Cars: A New Frontier For Bug Bounties?
Commentary  |  8/24/2015  | 
With up to 100 million lines of code in the average car today -- and growing -- security vulnerabilities are bound to become the new normal.
Dark Reading News Desk Comes To You Live From Black Hat
Commentary  |  8/3/2015  | 
Live video coverage from Las Vegas Wednesday and Thursday
Software Security Is Hard But Not impossible
Commentary  |  8/12/2015  | 
New Interactive Application Security Testing products produce an interesting result under the right conditions, but they cant, by themselves, find all the security vulnerabilities you need to fix.
What Should the Users of Ashley Madison Do?
Partner Perspectives  |  8/6/2015  | 
Security-minded professionals offer their advice at Black Hat party.
Black Hat, Data Science, Machine Learning, and YOU!
Commentary  |  8/14/2015  | 
The time has come for security pros to start honing in on their machine learning skills. Heres why.
With Great IoT Comes Great Insecurity
Commentary  |  8/21/2015  | 
In the brave new world of 'things' and the services they connect to, built-in security has never been more critical. Here's what's getting in the way.
Applying the 80/20 Rule to Cyber Security Practices
Commentary  |  8/19/2015  | 
How to look holistically across technology and processes and focus resources on threats that create the greatest damage.
Beware The Hidden Risk Of Business Partners In The Cloud
Commentary  |  8/20/2015  | 
Enterprises vastly underestimate the cyber risk from digital connections to vendors, suppliers, agencies, consultants -- and any company with which employees do business.
Getting To Yes, Cooperatively
Commentary  |  8/26/2015  | 
As security advocates, determining what beneficial means to a particular audience should be our first step in developing recommendations.
Flash: Web Browser Plugins Are Vulnerable
Partner Perspectives  |  8/27/2015  | 
Maybe its time to uninstall Flash for those that dont need it and continuously monitor those that do.
Top Infosec Execs Will Eventually Report To CEOs, CISOs Say
Commentary  |  8/31/2015  | 
But becoming a trusted resource to the executive suite will demand major changes in the traditional chief information security officer role.
How To Empower Women In Security
Commentary  |  8/11/2015  | 
First-ever Black Hat USA women in security panel debuted last week--and now will be an annual event.
Black Hat USA: Empowering Women In Security
Commentary  |  8/4/2015  | 
A panel of influential women in the security industry will share their insights and identify resources for fostering professional development (and recruiting) of women in the field.
Securing Black Hat From Black Hat
Commentary  |  8/14/2015  | 
Dr. Chaos shares the inside scoop on the challenges and rewards of protecting one of the 'most hostile networks on the planet.'


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27020
PUBLISHED: 2021-05-14
Password generator feature in Kaspersky Password Manager was not completely cryptographically strong and potentially allowed an attacker to predict generated passwords in some cases. An attacker would need to know some additional information (for example, time of password generation).
CVE-2021-30183
PUBLISHED: 2021-05-14
Cleartext storage of sensitive information in multiple versions of Octopus Server where in certain situations when running import or export processes, the password used to encrypt and decrypt sensitive values would be written to the logs in plaintext.
CVE-2021-31922
PUBLISHED: 2021-05-14
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3.
CVE-2021-32051
PUBLISHED: 2021-05-14
Hexagon G!nius Auskunftsportal before 5.0.0.0 allows SQL injection via the GiPWorkflow/Service/DownloadPublicFile id parameter.
CVE-2021-32615
PUBLISHED: 2021-05-13
Piwigo 11.4.0 allows admin/user_list_backend.php order[0][dir] SQL Injection.