Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in January 2021
Digital Identity Is the New Security Control Plane
Last Message: 1/29/2021
 |  Comments: 1
The Insecure State of Microsoft Teams Security
Last Message: 1/29/2021
 |  Comments: 1
Building Your Personal Privacy Risk Tolerance Profile
Last Message: 1/28/2021
 |  Comments: 1
Google to Delete 'Secure' Label from HTTPS Sites
Last Message: 1/28/2021
 |  Comments: 1
Learn SAML: The Language You Don't Know You're Already Speaking
Last Message: 1/26/2021
 |  Comments: 1
PoisonTap USB Device Can Hack A Locked PC In A Minute
Last Message: 1/26/2021
 |  Comments: 1
5 Key Takeaways From the SolarWinds Breach
Last Message: 1/25/2021
 |  Comments: 1
Name That Toon: Before I Go ...
Last Message: 1/25/2021
 |  Comments: 11
Attackers Leave Stolen Credentials Searchable on Google
Last Message: 1/25/2021
 |  Comments: 1
And Now A PREDATOR To Fight DNS Domain Abuse
Last Message: 1/23/2021
 |  Comments: 7
More SolarWinds Attack Details Emerge
Last Message: 1/23/2021
 |  Comments: 1
Preparing For The Future Of Online Threats
Last Message: 1/21/2021
 |  Comments: 14
10 Standout Security M&A Deals from Q1 2020
Last Message: 1/20/2021
 |  Comments: 2
NSA Appoints Rob Joyce as Cyber Director
Last Message: 1/19/2021
 |  Comments: 1
Understanding TCP/IP Stack Vulnerabilities in the IoT
Last Message: 1/19/2021
 |  Comments: 1
Q&A: How Systemic Racism Weakens Cybersecurity
Last Message: 1/19/2021
 |  Comments: 6
BYOD: 'We Have Met the Enemy & He Is Us'
Last Message: 1/19/2021
 |  Comments: 6
6 Personality Profiles of White-Hat Hackers
Last Message: 1/18/2021
 |  Comments: 1
Deep Instinct Touts Predictive Aspects of Deep Learning
Last Message: 1/17/2021
 |  Comments: 3
How Can I Help My Users Spot Disinformation?
Last Message: 1/15/2021
 |  Comments: 1
Do Standards Exist That Certify Secure IoT Systems?
Last Message: 1/14/2021
 |  Comments: 1
Vulnerability Management Has a Data Problem
Last Message: 1/14/2021
 |  Comments: 1
When It Comes To Security Tools, More Isn't More
Last Message: 1/12/2021
 |  Comments: 1
Mobile Device Security Isn't All About Devices
Last Message: 1/11/2021
 |  Comments: 3
New Proposed DNS Security Features Released
Last Message: 1/10/2021
 |  Comments: 3
Even Small Nations Have Jumped into the Cyber Espionage Game
Last Message: 1/8/2021
 |  Comments: 1
Google Removes 500 Android Apps Following Spyware Scare
Last Message: 1/7/2021
 |  Comments: 2
The Yellow Brick Road to Risk Management
Last Message: 1/6/2021
 |  Comments: 2
Massive Bot-Enabled Ad Fraud Campaign Targeted Connected TVs
Last Message: 1/5/2021
 |  Comments: 1
T-Mobile Hacked -- Again
Last Message: 1/5/2021
 |  Comments: 1
SASE 101: Why All the Buzz?
Last Message: 1/4/2021
 |  Comments: 1
Name That Toon: Winter Forecast
Last Message: 1/4/2021
 |  Comments: 16


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-26773
PUBLISHED: 2022-05-26
A logic issue was addressed with improved state management. This issue is fixed in iTunes 12.12.4 for Windows. An application may be able to delete files for which it does not have permission.
CVE-2022-26774
PUBLISHED: 2022-05-26
A logic issue was addressed with improved state management. This issue is fixed in iTunes 12.12.4 for Windows. A local attacker may be able to elevate their privileges.
CVE-2022-26775
PUBLISHED: 2022-05-26
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4. An attacker may be able to cause unexpected application termination or arbitrary code execution.
CVE-2022-26776
PUBLISHED: 2022-05-26
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. An attacker may be able to cause unexpected application termination or arbitrary code execution.
CVE-2022-29632
PUBLISHED: 2022-05-26
An arbitrary file upload vulnerability in the component /course/api/upload/pic of Roncoo Education v9.0.0 allows attackers to execute arbitrary code via a crafted file.