Dark Reading Article Boards

Message Boards posted in November 2016
Page 1 / 2   >   >>
New Internet Security Domains Debut
Last Message: 11/30/2016
 |  Comments: 12
How Clinton, Trump Could Champion Cybersecurity
Last Message: 11/30/2016
 |  Comments: 13
5 Links Of The Attack Chain And How To Disrupt Them
Last Message: 11/29/2016
 |  Comments: 1
Balancing The Risk & Promise Of The Internet Of Things
Last Message: 11/28/2016
 |  Comments: 1
NSA Chief Says DNC Email Leak Was Deliberate Act
Last Message: 11/28/2016
 |  Comments: 15
"HTTPS Hackable In 30 Seconds: DHS Alert"
Last Message: 11/28/2016
 |  Comments: 1
Snowden May Help Explain Your Job To Your Family
Last Message: 11/26/2016
 |  Comments: 5
Oracle Announces Acquisition Of Dyn
Last Message: 11/24/2016
 |  Comments: 1
Why Cybersecurity Certifications Matter -- Or Not
Last Message: 11/23/2016
 |  Comments: 8
Windows 10 Updates Target Ransomware Threats
Last Message: 11/22/2016
 |  Comments: 2
The 7 Most Significant Government Data Breaches
Last Message: 11/21/2016
 |  Comments: 3
Attacker's Playbook Top 5 Is High On Passwords, Low On Malware
Last Message: 11/21/2016
 |  Comments: 5
6 Tips To Secure Webcams, Stop Keyloggers
Last Message: 11/21/2016
 |  Comments: 10
5 Ways Retailers Can Stay Safe Over the Holidays
Last Message: 11/21/2016
 |  Comments: 1
The 7 Types Of Security Jobs, According To NIST
Last Message: 11/18/2016
 |  Comments: 4
Russian Hackers Behind DNC Breach Wage Post-US Election Attacks
Last Message: 11/18/2016
 |  Comments: 7
Bug Bounties and the Zero-Day Trade
Last Message: 11/16/2016
 |  Comments: 7
Data Manipulation: An Imminent Threat
Last Message: 11/16/2016
 |  Comments: 3
Ubuntu Forums Database Hacked
Last Message: 11/16/2016
 |  Comments: 5
Firmware Secretly Sent Text, Call Data On Android Users To China
Last Message: 11/16/2016
 |  Comments: 1
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Last Message: 11/15/2016
 |  Comments: 1
How Secure is Secure? Tips For Investing In The Right Strategy
Last Message: 11/14/2016
 |  Comments: 2
Learning To Trust Cloud Security
Last Message: 11/14/2016
 |  Comments: 1
FBI: BEC Scam Attempts Amount to $3 Billion
Last Message: 11/13/2016
 |  Comments: 1
75,000 Data Protection Officers Needed By 2018 To Handle EU Law
Last Message: 11/11/2016
 |  Comments: 2
How To Build A Comprehensive Security Architecture
Last Message: 11/11/2016
 |  Comments: 1
Security Industry Takes Steps To Close Gender Gap
Last Message: 11/11/2016
 |  Comments: 1
Transitioning From The Server Room To The Boardroom
Last Message: 11/8/2016
 |  Comments: 1
Some SuperPAC Websites Are Not Super-Secure
Last Message: 11/7/2016
 |  Comments: 1
Catching Online Scammers, Dealers & Drug Dealers With DNS
Last Message: 11/7/2016
 |  Comments: 1
'AtomBombing' Microsoft Windows Via Code Injection
Last Message: 11/7/2016
 |  Comments: 1
20 Endpoint Security Questions You Never Thought to Ask
Last Message: 11/6/2016
 |  Comments: 3
Election 2016 & WikiLeaks: Bad, But Not Your Worst Nightmare
Last Message: 11/5/2016
 |  Comments: 1
Page 1 / 2   >   >>


Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Why Password Management and Security Strategies Fall Short
Steve Zurier, Freelance Writer,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16470
PUBLISHED: 2018-11-13
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
CVE-2018-16471
PUBLISHED: 2018-11-13
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to a...
CVE-2018-6980
PUBLISHED: 2018-11-13
VMware vRealize Log Insight (4.7.x before 4.7.1 and 4.6.x before 4.6.2) contains a vulnerability due to improper authorization in the user registration method. Successful exploitation of this issue may allow Admin users with view only permission to perform certain administrative functions which they...
CVE-2018-17614
PUBLISHED: 2018-11-13
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Losant Arduino MQTT Client prior to V2.7. User interaction is not required to exploit this vulnerability. The specific flaw exists within the parsing of MQTT PUBLISH packets. The issue results from th...
CVE-2018-8009
PUBLISHED: 2018-11-13
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.