Flash Poll

Latest Content
Political Climate Change
Flash Poll  |  11/2/2017  | 
Security Time
Flash Poll  |  4/14/2015  | 
Prepared for a Cyberattack?
Flash Poll  |  3/11/2015  | 
Eyes On The Analytics Prize
Flash Poll  |  3/1/2015  | 
Analyze This?
Flash Poll  |  2/1/2015  | 
Monitor Management
Flash Poll  |  1/2/2015  | 
Action Speaks Louder
Flash Poll  |  1/1/2015  | 
Reliable Sources
Flash Poll  |  12/1/2014  | 
Defending Against Malware
Flash Poll  |  11/10/2014  | 
Intelligence Hired Guns?
Flash Poll  |  11/1/2014  | 
Breach Security 101
Flash Poll  |  10/21/2014  | 
Death of the Perimeter
Flash Poll  |  10/21/2014  | 
See Something, Say Something
Flash Poll  |  10/1/2014  | 
Bashed & Shellshocked
Flash Poll  |  9/30/2014  | 
Hacking Humans
Flash Poll  |  9/5/2014  | 
Security of 'Things'
Flash Poll  |  8/21/2014  | 
Security Org Chart
Flash Poll  |  7/18/2014  | 
Risk Management Report Card
Flash Poll  |  6/16/2014  | 
Greatest Threat
Flash Poll  |  6/4/2014  | 
Lessons Learned
Flash Poll  |  6/1/2014  | 
Cyber Security Skills
Flash Poll  |  5/29/2014  | 
Cyberbreach or Cyberrisk Insurance
Flash Poll  |  5/20/2014  | 
State of IT Security
Flash Poll  |  5/5/2014  | 
Broken Heartbeat
Flash Poll  |  4/10/2014  | 
Windows XP
Flash Poll  |  4/2/2014  | 
Safety Equipment
Flash Poll  |  11/15/2013  | 


Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18805
PUBLISHED: 2018-11-16
PointOfSales 1.0 allows SQL injection via the login screen, related to LoginForm1.vb.
CVE-2018-18806
PUBLISHED: 2018-11-16
School Equipment Monitoring System 1.0 allows SQL injection via the login screen, related to include/user.vb.
CVE-2018-16396
PUBLISHED: 2018-11-16
An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.
CVE-2018-18755
PUBLISHED: 2018-11-16
K-iwi Framework 1775 has SQL Injection via the admin/user/group/update user_group_id parameter or the admin/user/user/update user_id parameter.
CVE-2018-18756
PUBLISHED: 2018-11-16
Local Server 1.0.9 has a Buffer Overflow via crafted data on Port 4008.