Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in October 2020
Do's and Don'ts for School Cybersecurity Awareness
Last Message: 10/29/2020
 |  Comments: 1
6 Ways Passwords Fail Basic Security Tests
Last Message: 10/28/2020
 |  Comments: 1
Employees Aware of Emailed Threats Open Suspicious Messages
Last Message: 10/28/2020
 |  Comments: 1
"Hacking Higher Education"
Last Message: 10/28/2020
 |  Comments: 104
Name That Toon: Castle in the Sky
Last Message: 10/27/2020
 |  Comments: 18
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Last Message: 10/27/2020
 |  Comments: 2
Latest Security News & Commentary about COVID-19
Last Message: 10/26/2020
 |  Comments: 20
Online Privacy: We Just Don't Care
Last Message: 10/26/2020
 |  Comments: 1
Twitter Hack: The Spotlight that Insider Threats Need
Last Message: 10/25/2020
 |  Comments: 2
Google Removes 500 Android Apps Following Spyware Scare
Last Message: 10/24/2020
 |  Comments: 2
7 Tips for Choosing Security Metrics That Matter
Last Message: 10/23/2020
 |  Comments: 1
8 New and Hot Cybersecurity Certifications for 2020
Last Message: 10/23/2020
 |  Comments: 2
3 Ways Companies are Working on Security by Design
Last Message: 10/21/2020
 |  Comments: 1
Cartoon: Identity Crisis
Last Message: 10/21/2020
 |  Comments: 5
Overcoming the Challenge of Shorter Certificate Lifespans
Last Message: 10/21/2020
 |  Comments: 1
US Border Policy Shifts May Drive Changes in Laptop Security
Last Message: 10/19/2020
 |  Comments: 15
The Return of Email Flooding
Last Message: 10/19/2020
 |  Comments: 6
What's Really Happening in Infosec Hiring Now?
Last Message: 10/18/2020
 |  Comments: 1
Hide and Seek Brings Persistence to IoT Botnets
Last Message: 10/17/2020
 |  Comments: 3
A 7-Step Cybersecurity Plan for Healthcare Organizations
Last Message: 10/15/2020
 |  Comments: 1
London Borough of Hackney Investigates 'Serious' Cyberattack
Last Message: 10/14/2020
 |  Comments: 1
6 Best Practices for Using Open Source Software Safely
Last Message: 10/13/2020
 |  Comments: 2
Why IT Security RFPs Are Like Junk Food
Last Message: 10/13/2020
 |  Comments: 4
Demystifying Mental Health in the Infosec Community
Last Message: 10/10/2020
 |  Comments: 3
The Three Dimensions of the Threat Intelligence Scale Problem
Last Message: 10/10/2020
 |  Comments: 7
Mobile Malware Incidents Hit 100% of Businesses
Last Message: 10/9/2020
 |  Comments: 10
New Research Finds Bugs in Every Anti-Malware Product Tested
Last Message: 10/8/2020
 |  Comments: 1
Rise in Remote MacOS Workers Driving Cybersecurity 'Rethink'
Last Message: 10/8/2020
 |  Comments: 1
Keeping a Strong Security Metrics Framework Strong
Last Message: 10/7/2020
 |  Comments: 3
Attacker Dwell Time: Ransomware's Most Important Metric
Last Message: 10/7/2020
 |  Comments: 3
Sodinokibi Ransomware: Where Attackers' Money Goes
Last Message: 10/5/2020
 |  Comments: 2
Hack Costs Coincheck Cryptocurrency Exchange $530 Million
Last Message: 10/5/2020
 |  Comments: 1
Ransomware Trains Its Sights on Cloud Providers
Last Message: 10/5/2020
 |  Comments: 16
Safeguarding Schools Against RDP-Based Ransomware
Last Message: 10/2/2020
 |  Comments: 1
Cryptojacking: The Unseen Threat
Last Message: 10/1/2020
 |  Comments: 1


COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27652
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27653
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27654
PUBLISHED: 2020-10-29
Improper access control vulnerability in lbd in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to execute arbitrary commands via port (1) 7786/tcp or (2) 7787/tcp.
CVE-2020-27655
PUBLISHED: 2020-10-29
Improper access control vulnerability in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to access restricted resources via inbound QuickConnect traffic.
CVE-2020-27656
PUBLISHED: 2020-10-29
Cleartext transmission of sensitive information vulnerability in DDNS in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors.