Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in January 2020
Average Ransomware Payments More Than Doubled in Q4 2019
Last Message: 1/31/2020
 |  Comments: 11
Adware vs. Ad Fraud: Viva la Difference!
Last Message: 1/31/2020
 |  Comments: 1
Microsoft Defender ATP Brings EDR Capabilities to macOS
Last Message: 1/31/2020
 |  Comments: 1
Apple Misstep Leaves iPhones Open to Jailbreak
Last Message: 1/30/2020
 |  Comments: 1
Active Directory Needs an Update: Here's Why
Last Message: 1/29/2020
 |  Comments: 3
7 Free Tools for Better Visibility Into Your Network
Last Message: 1/28/2020
 |  Comments: 3
'PowerSnitch' Hacks Androids via Power Banks
Last Message: 1/28/2020
 |  Comments: 5
New Security Woes for Popular IoT Protocols
Last Message: 1/27/2020
 |  Comments: 1
Using Artificial InteIligence to Power Application Security
Last Message: 1/27/2020
 |  Comments: 1
Lessons Learned from 7 Big Breaches in 2019
Last Message: 1/26/2020
 |  Comments: 3
Data Privacy Careers Are Helping to Close the IT Gender Gap
Last Message: 1/26/2020
 |  Comments: 6
IoT Security: How Far We've Come, How Far We Have to Go
Last Message: 1/24/2020
 |  Comments: 11
Why Every Organization Needs an Incident Response Plan
Last Message: 1/24/2020
 |  Comments: 4
Toyota Builds Open-Source Car-Hacking Tool
Last Message: 1/24/2020
 |  Comments: 2
Mobile Banking Malware Up 50% in First Half of 2019
Last Message: 1/23/2020
 |  Comments: 3
6 Traits to Develop for Cybersecurity Success
Last Message: 1/23/2020
 |  Comments: 1
For Mismanaged SOCs, The Price Is Not Right
Last Message: 1/23/2020
 |  Comments: 1
7 Tips for Infosec Pros Considering A Lateral Career Move
Last Message: 1/22/2020
 |  Comments: 1
Will This Be the Year of the Branded Cybercriminal?
Last Message: 1/20/2020
 |  Comments: 2
More Than 100 Flavors Of Malware Are Stealing Bitcoins
Last Message: 1/19/2020
 |  Comments: 2
How Secure are our Voting Systems for November 2018?
Last Message: 1/19/2020
 |  Comments: 12
Microsoft to Officially End Support for Windows 7, Server 2008
Last Message: 1/18/2020
 |  Comments: 2
Mobile App Back-End Servers, Databases at Risk
Last Message: 1/15/2020
 |  Comments: 2
AWS Issues 'Urgent' Warning for Database Users to Update Certs
Last Message: 1/10/2020
 |  Comments: 1
In App Development, Does No-Code Mean No Security?
Last Message: 1/10/2020
 |  Comments: 2
10 Women in Security You May Not Know But Should
Last Message: 1/9/2020
 |  Comments: 8
Cell Phone Device Detects Deleted Data
Last Message: 1/8/2020
 |  Comments: 1
AI-Based POC, DeepLocker, Could Conceal Targeted Attacks
Last Message: 1/7/2020
 |  Comments: 2
Researcher Cracks San Francisco's Emergency Siren System
Last Message: 1/7/2020
 |  Comments: 3
Cartoon: Bring IOT to Work
Last Message: 1/6/2020
 |  Comments: 10
Malware Hits Travelex Currency Exchange Service
Last Message: 1/6/2020
 |  Comments: 1
Top Five Security Tools for Mac OS X
Last Message: 1/4/2020
 |  Comments: 1
Attackers Exploit MSP's Tools to Distribute Ransomware
Last Message: 1/2/2020
 |  Comments: 1


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1809
PUBLISHED: 2022-05-21
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
CVE-2022-31267
PUBLISHED: 2022-05-21
Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext '[email protected]\n\trole = "#admin"' value.
CVE-2022-31268
PUBLISHED: 2022-05-21
A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).
CVE-2022-31264
PUBLISHED: 2022-05-21
Solana solana_rbpf before 0.2.29 has an addition integer overflow via invalid ELF program headers. elf.rs has a panic via a malformed eBPF program.
CVE-2022-31259
PUBLISHED: 2022-05-21
The route lookup process in beego through 1.12.4 and 2.x through 2.0.2 allows attackers to bypass access control. When a /p1/p2/:name route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).