Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Latest Message Boards
<<   <   Page 2 / 2
Name That Edge Toon: Rough Patch?
Last Message: 5/3/2021
 |  Comments: 6
Ghost Town Security: What Threats Lurk in Abandoned Offices?
Last Message: 4/30/2021
 |  Comments: 2
How to Secure Employees' Home Wi-Fi Networks
Last Message: 4/30/2021
 |  Comments: 6
Looking for Greater Security Culture? Ask an 8-Bit Plumber
Last Message: 4/29/2021
 |  Comments: 1
10K Hackers Defend the Planet Against Extraterrestrials
Last Message: 4/29/2021
 |  Comments: 1
Will Vote-by-App Ever Be Safe?
Last Message: 4/27/2021
 |  Comments: 2
Name That Toon: Greetings, Earthlings
Last Message: 4/27/2021
 |  Comments: 17
Tell Us the Truth: Why Do You LOVE Passwords?
Last Message: 4/26/2021
 |  Comments: 1
8 'SOC-as-a-Service' Offerings
Last Message: 4/22/2021
 |  Comments: 3
Attackers Test Weak Passwords in Purple Fox Malware Attacks
Last Message: 4/20/2021
 |  Comments: 1
4 Open Source Tools to Add to Your Security Arsenal
Last Message: 4/19/2021
 |  Comments: 2
Inside the Ransomware Campaigns Targeting Exchange Servers
Last Message: 4/16/2021
 |  Comments: 1
Global Dwell Time Drops as Ransomware Attacks Accelerate
Last Message: 4/15/2021
 |  Comments: 1
Name That Edge Toon: In Hot Water
Last Message: 4/12/2021
 |  Comments: 10
Did 4 Major Ransomware Groups Truly Form a Cartel?
Last Message: 4/12/2021
 |  Comments: 1
Battling Bots: How to Find Fake Twitter Followers
Last Message: 4/10/2021
 |  Comments: 32
Rethinking Cyberattack Response: Prevention & Preparedness
Last Message: 4/9/2021
 |  Comments: 1
9 Tips to Prepare for the Future of Cloud & Network Security
Last Message: 4/9/2021
 |  Comments: 3
FBI & CISA Warn of Active Attacks on FortiOS Vulnerabilities
Last Message: 4/8/2021
 |  Comments: 1
Realistic Patch Management Tips, Post-SolarWinds
Last Message: 4/6/2021
 |  Comments: 2
The Three Dimensions of the Threat Intelligence Scale Problem
Last Message: 4/5/2021
 |  Comments: 7
Big Changes Are Coming to Security Analytics & Operations
Last Message: 4/3/2021
 |  Comments: 5
Name That Toon: Something Seems Afoul
Last Message: 4/1/2021
 |  Comments: 31
CISA Builds Out Defensive Tools for Security Teams
Last Message: 3/30/2021
 |  Comments: 1
Security Pros Agree Military Should Conduct Offensive Hacking
Last Message: 3/30/2021
 |  Comments: 2
DDoS's Evolution Doesn't Require a Security Evolution
Last Message: 3/29/2021
 |  Comments: 1
"LulzSec Suspect Learns Even HideMyAss.com Has Limits"
Last Message: 3/26/2021
 |  Comments: 1
Instagram Hack: Hundreds Affected, Russia Suspected
Last Message: 3/26/2021
 |  Comments: 1
RDP Attacks Persist Near Record Levels in 2021
Last Message: 3/25/2021
 |  Comments: 1
What a Federal Data Privacy Law Would Mean for Consumers
Last Message: 3/25/2021
 |  Comments: 1
Look The Other Way: DDoS Attacks As Diversions
Last Message: 3/25/2021
 |  Comments: 1
Anti-Spoofing for Email Gains Adoption, but Enforcement Lags
Last Message: 3/25/2021
 |  Comments: 2
New Social Security Scam Spoofs Government Badges
Last Message: 3/23/2021
 |  Comments: 1
44% of Security Threats Start in the Cloud
Last Message: 3/23/2021
 |  Comments: 2
Why CSP Isn't Enough to Stop Magecart-Like Attacks
Last Message: 3/22/2021
 |  Comments: 3
New Malware Hidden in Apple IDE Targets macOS Developers
Last Message: 3/22/2021
 |  Comments: 1
Name That Toon: Something Seems Afoul
Last Message: 3/19/2021
 |  Comments: 6
Android Security: 8 Signs Hackers Own Your Smartphone
Last Message: 3/19/2021
 |  Comments: 22
Teen Behind Twitter Hack Agrees to Three Years in Prison
Last Message: 3/18/2021
 |  Comments: 1
<<   <   Page 2 / 2


Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26585
PUBLISHED: 2021-06-24
A potential vulnerability has been identified in HPE OneView Global Dashboard release 2.31 which could lead to a local disclosure of privileged information. HPE has provided an update to OneView Global Dashboard. The issue is resolved in 2.32.
CVE-2021-31412
PUBLISHED: 2021-06-24
Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 1...
CVE-2021-33604
PUBLISHED: 2021-06-24
URL encoding error in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser.
CVE-2020-28097
PUBLISHED: 2021-06-24
The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.
CVE-2020-7862
PUBLISHED: 2021-06-24
A vulnerability in agent program of HelpU remote control solution could allow an authenticated remote attacker to execute arbitrary commands This vulnerability is due to insufficient input santization when communicating customer process.