Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Event Updates

Content tagged with Black Hat posted in March 2017
Black Hat Review Board Spotlight:
Beyond the Bio with Jamie Butler
Event Updates  |  3/14/2017  | 
Get to know the Black Hat Review Board in a new interview series, Beyond the Bio. In this series, Black Hat Review Board Members offer insight from their favorite exploits and pastimes to their most memorable Black Hat experiences.
Black Hat Asia 2017:
CISOs Must Get Proactive about the Internet of Things
Event Updates  |  3/13/2017  | 
These four steps will help reduce the risk from looming IoT attacks
Black Hat Asia 2017:
Pentesting for Vulnerabilities
Event Updates  |  3/9/2017  | 
Continually testing for vulnerabilities is critical to threat detection and prevention
Black Hat Asia 2017:
Securing Mobile Devices
Event Updates  |  3/8/2017  | 
Opportunities for phishing, ransomware, cryptocurrency mining and other attacks are endless. Understanding mechanisms for compromising Android and iOS systems is crucial to detecting and preventing security breaches.
Black Hat Asia 2017:
Threat & Vulnerability Management: Knowing Youre Secure
Event Updates  |  3/7/2017  | 
Threat and vulnerability management is a foundational technique that every security professional should embrace. Heres why.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37457
PUBLISHED: 2021-07-25
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the SipRule field (stored).
CVE-2021-37458
PUBLISHED: 2021-07-25
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the primary phone field (stored).
CVE-2021-37459
PUBLISHED: 2021-07-25
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the customer name field (stored).
CVE-2021-37460
PUBLISHED: 2021-07-25
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /planprop?id= (reflected).
CVE-2021-37461
PUBLISHED: 2021-07-25
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /extensionsinstruction?id= (reflected).