Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in January 2017
Page 1 / 2   >   >>
Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Last Message: 1/31/2017
 |  Comments: 1
3 Things Companies Must Do Before A Data Breach
Last Message: 1/31/2017
 |  Comments: 1
"5 Ways To Solve The Password Reset Problem"
Last Message: 1/30/2017
 |  Comments: 2
10 Cocktail Party Security Tips From The Experts
Last Message: 1/29/2017
 |  Comments: 6
10 Things InfoSec Pros Can Celebrate About 2016
Last Message: 1/27/2017
 |  Comments: 2
Cyber Incidents Hit 85% Of Firms Over Past 12 Months
Last Message: 1/26/2017
 |  Comments: 1
SEC Investigates Yahoo Data Breaches
Last Message: 1/26/2017
 |  Comments: 1
Meet Ripper.cc, A Reputation Service For Cybercriminals
Last Message: 1/26/2017
 |  Comments: 4
Email Encryption On The Rise But Still Not 'Universal'
Last Message: 1/26/2017
 |  Comments: 1
Google Removes Ransomware-Laden App From Play Store
Last Message: 1/25/2017
 |  Comments: 1
Bad Bots Up Their Human Impersonation Game
Last Message: 1/25/2017
 |  Comments: 1
Verizon Acquisition Of Yahoo Delayed
Last Message: 1/24/2017
 |  Comments: 1
"Google Drive Privacy: 4 Misunderstood Facts"
Last Message: 1/23/2017
 |  Comments: 12
Number Of Data Breach Disclosures Jumped 40% in 2016
Last Message: 1/23/2017
 |  Comments: 1
Cyber Lessons From The NSAs Admiral Michael Rogers
Last Message: 1/23/2017
 |  Comments: 2
What's Next For Canadas Surveillance Landscape?
Last Message: 1/23/2017
 |  Comments: 3
3 Lessons From The Yahoo Breach
Last Message: 1/23/2017
 |  Comments: 1
80% Of IT Pros Say Users Set Up Unapproved Cloud Services
Last Message: 1/23/2017
 |  Comments: 2
5 Ways The Cyber-Threat Landscape Shifted In 2016
Last Message: 1/22/2017
 |  Comments: 5
6 Ways To Prepare For The EUs GDPR
Last Message: 1/20/2017
 |  Comments: 2
The 4 Top Barriers To Effective Incident Response
Last Message: 1/19/2017
 |  Comments: 1
2017 IT Forecast: Cloudy With A Chance Of Security Concerns
Last Message: 1/19/2017
 |  Comments: 1
Chelsea Manning Granted Presidential Pardon
Last Message: 1/18/2017
 |  Comments: 1
Cartoon: Ransomware Strategy
Last Message: 1/18/2017
 |  Comments: 1
"Microsoft Tech Support Scams: Why They Thrive"
Last Message: 1/17/2017
 |  Comments: 10
Name That Toon: Naughty or Nice
Last Message: 1/16/2017
 |  Comments: 106
Cyberrisk Through A Business Lens
Last Message: 1/16/2017
 |  Comments: 6
Major Cyberattacks On Healthcare Grew 63% In 2016
Last Message: 1/16/2017
 |  Comments: 8
7 Ways To Fine-Tune Your Threat Intelligence Model
Last Message: 1/15/2017
 |  Comments: 3
The 3 C's Of Security Awareness
Last Message: 1/14/2017
 |  Comments: 6
Ransomware Rising On The Plant Floor
Last Message: 1/14/2017
 |  Comments: 1
Hacker To Make Amends By Bolstering Victim's Cybersecurity
Last Message: 1/13/2017
 |  Comments: 1
Naughty & Nice: Dark Reading Caption Contest Winners
Last Message: 1/12/2017
 |  Comments: 1
Credit Freeze: The New Normal In Data Breach Protection?
Last Message: 1/11/2017
 |  Comments: 1
A Look Inside Responsible Vulnerability Disclosure
Last Message: 1/9/2017
 |  Comments: 1
DHS-FBI Report Shows Russian Attribution's A Bear
Last Message: 1/9/2017
 |  Comments: 2
8 Boldest Security Predictions For 2017
Last Message: 1/8/2017
 |  Comments: 5
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-3296
PUBLISHED: 2022-09-25
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.
CVE-2022-41340
PUBLISHED: 2022-09-24
The secp256k1-js package before 1.1.0 for Node.js implements ECDSA without required r and s validation, leading to signature forgery.
CVE-2022-23463
PUBLISHED: 2022-09-24
Nepxion Discovery is a solution for Spring Cloud. Discover is vulnerable to SpEL Injection in discovery-commons. DiscoveryExpressionResolver’s eval method is evaluating expression with a StandardEvaluationContext, allowing the expression to reach and interact with Java classes suc...
CVE-2022-23464
PUBLISHED: 2022-09-24
Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a potential Server-Side Request Forgery (SSRF). RouterResourceImpl uses RestTemplate’s getForEntity to retrieve the contents of a URL containing user-controlled input, potentially resulting in Information...
CVE-2022-23461
PUBLISHED: 2022-09-24
Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds.