Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Latest Message Boards
Page 1 / 2   >   >>
Name That Toon: Sight Unseen
Last Message: 6/23/2021
 |  Comments: 10
"Hacking Higher Education"
Last Message: 6/22/2021
 |  Comments: 11
Hacking Group LulzSec Denies Arrest Report
Last Message: 6/22/2021
 |  Comments: 5
Name That Toon: Sight Unseen
Last Message: 6/21/2021
 |  Comments: 12
What the FedEx Logo Taught Me About Cybersecurity
Last Message: 6/21/2021
 |  Comments: 1
How President Biden Can Better Defend the US From Russian Hacks
Last Message: 6/21/2021
 |  Comments: 2
Cybercrime May Be the World's Third-Largest Economy by 2021
Last Message: 6/19/2021
 |  Comments: 2
Ransomware Is Not the Problem
Last Message: 6/10/2021
 |  Comments: 1
Name That Edge Toon: In Tow
Last Message: 6/7/2021
 |  Comments: 7
How Can I Help Remote Workers Secure Their Home Routers?
Last Message: 6/7/2021
 |  Comments: 3
The Makings of a Better Cybersecurity Hire
Last Message: 6/7/2021
 |  Comments: 1
Hackers Cash In On ATMs
Last Message: 6/6/2021
 |  Comments: 1
The Colonial Pipeline Attack Is Your Boardroom Wake-Up Call
Last Message: 6/4/2021
 |  Comments: 1
Name That Toon: Road Trip
Last Message: 6/2/2021
 |  Comments: 18
Name That Toon: Road Trip
Last Message: 6/1/2021
 |  Comments: 4
Let's Stop Blaming Employees for Our Data Breaches
Last Message: 5/28/2021
 |  Comments: 1
How Are Cyber Insurance Companies Assessing Ransomware Risk?
Last Message: 5/26/2021
 |  Comments: 1
7 Modern-Day Cybersecurity Realities
Last Message: 5/26/2021
 |  Comments: 3
Why Social Media Sites Are The New Cyber Weapons Of Choice
Last Message: 5/25/2021
 |  Comments: 29
How to Get Employees to Care About Security
Last Message: 5/24/2021
 |  Comments: 1
The Future Of ATM Hacking
Last Message: 5/21/2021
 |  Comments: 6
Regular User Training Most Effective Security Antidote
Last Message: 5/20/2021
 |  Comments: 3
Mobile Security Gap Threatens Enterprises
Last Message: 5/15/2021
 |  Comments: 8
Colonial Pipeline Cyberattack: What Security Pros Need to Know
Last Message: 5/14/2021
 |  Comments: 1
Why You Should Be Prepared to Pay a Ransom
Last Message: 5/14/2021
 |  Comments: 1
Bitcoin Exchanges Buckle Under DDoS Attacks
Last Message: 5/13/2021
 |  Comments: 4
Name That Toon: Greeting, Earthlings
Last Message: 5/11/2021
 |  Comments: 28
Dark Reading to Upgrade Site Design, Performance
Last Message: 5/10/2021
 |  Comments: 1
How Hackers Could Hit Super Bowl LIII
Last Message: 5/9/2021
 |  Comments: 2
How to Empower Today's 'cISOs'
Last Message: 5/7/2021
 |  Comments: 1
Name That Edge Toon: Magical May
Last Message: 5/6/2021
 |  Comments: 9
Wanted: The (Elusive) Cybersecurity 'All-Star'
Last Message: 5/6/2021
 |  Comments: 1
Ransomware Recovery Costs Near $2M
Last Message: 5/5/2021
 |  Comments: 1
Kaspersky: Targeted Ransomware Grows Nearly 800%
Last Message: 5/5/2021
 |  Comments: 1
Planning Our Passwordless Future
Last Message: 5/4/2021
 |  Comments: 1
3 Reasons to Train Security Pros to Code
Last Message: 5/4/2021
 |  Comments: 8
Name That Edge Toon: Rough Patch?
Last Message: 5/3/2021
 |  Comments: 6
Page 1 / 2   >   >>


Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-2322
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
CVE-2021-20019
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
CVE-2021-21809
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
CVE-2021-34067
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
CVE-2021-34068
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.