Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in December 2014
Page 1 / 2   >   >>
Tech Insight: Hacking The Nest Thermostat
Last Message: 12/31/2014
 |  Comments: 6
Why Digital Forensics In Incident Response Matter More Now
Last Message: 12/29/2014
 |  Comments: 6
The Coolest Hacks Of 2014
Last Message: 12/29/2014
 |  Comments: 9
Obama: U.S. Will Respond 'Proportionately' to Sony Cyber Attack
Last Message: 12/28/2014
 |  Comments: 20
North Korea's Internet Restored
Last Message: 12/27/2014
 |  Comments: 7
Time to Rethink Patching Strategies
Last Message: 12/26/2014
 |  Comments: 14
Security News No One Saw Coming In 2014
Last Message: 12/24/2014
 |  Comments: 12
CISO Holiday Bookshelf
Last Message: 12/22/2014
 |  Comments: 1
5 Pitfalls to Avoid When Running Your SOC
Last Message: 12/22/2014
 |  Comments: 6
New OpenSSL Flaw Exposes SSL To Man-In-The-Middle Attack
Last Message: 12/22/2014
 |  Comments: 10
The Internet's Winter Of Discontent
Last Message: 12/22/2014
 |  Comments: 1
'Grinch' Bug May Affect Most Linux Systems
Last Message: 12/22/2014
 |  Comments: 3
Sony Hackers Knew Details Of Sony's Entire IT Infrastructure
Last Message: 12/22/2014
 |  Comments: 32
The New Target for State-Sponsored Cyber Attacks: Applications
Last Message: 12/19/2014
 |  Comments: 1
How to Become a CISO
Last Message: 12/17/2014
 |  Comments: 87
Price Tag Rises For Stolen Identities Sold In The Underground
Last Message: 12/17/2014
 |  Comments: 4
Targeted Attacks: A Defender's Playbook
Last Message: 12/16/2014
 |  Comments: 3
FBI Calls For Law Facilitating Security Information Sharing
Last Message: 12/15/2014
 |  Comments: 2
Attackers Turn Focus to PoS Vendors
Last Message: 12/14/2014
 |  Comments: 1
DARPA Investigates Storytelling As Security Science
Last Message: 12/14/2014
 |  Comments: 1
'DeathRing' Malware Found Pre-Installed On Smartphones
Last Message: 12/12/2014
 |  Comments: 4
Ex-NSA Agents' Security Startup Lands $8 Million In Funding
Last Message: 12/11/2014
 |  Comments: 4
"Can The NSA Really Track Turned-Off Cellphones?"
Last Message: 12/11/2014
 |  Comments: 10
Breach Security 101
Last Message: 12/10/2014
 |  Comments: 1
'Inception' Cyber Espionage Campaign Targets PCs, Smartphones
Last Message: 12/10/2014
 |  Comments: 1
Employees Still Get More Access Than They Need
Last Message: 12/10/2014
 |  Comments: 1
2014: The Year of Shaken Trust
Last Message: 12/9/2014
 |  Comments: 1
Internet Of Things Devices Are Doomed
Last Message: 12/6/2014
 |  Comments: 10
Why Regin Malware Changes Threatscape Economics
Last Message: 12/5/2014
 |  Comments: 3
Q&A: Internet Encryption As The New Normal
Last Message: 12/4/2014
 |  Comments: 6
New TLS/SSL Version Ready In 2015
Last Message: 12/4/2014
 |  Comments: 2
The Case for Compelling Executive Dashboards
Last Message: 12/4/2014
 |  Comments: 4
The Real Cost of Cyber Incidents, According To Insurers
Last Message: 12/4/2014
 |  Comments: 3
Leveraging The Kill Chain For Awesome
Last Message: 12/4/2014
 |  Comments: 1
How I Became a CISO: Jonathan Trull, Qualys
Last Message: 12/3/2014
 |  Comments: 1
How Startups Can Jumpstart Security Innovation
Last Message: 12/3/2014
 |  Comments: 1
Why We Need Better Cyber Security: A Graphical Snapshot
Last Message: 12/3/2014
 |  Comments: 13
Cybercrooks Expand Sights To Market Manipulation
Last Message: 12/2/2014
 |  Comments: 2
Marrying Monitoring With IAM
Last Message: 12/2/2014
 |  Comments: 2
Youre Doing BYOD Wrong: These Numbers Prove It
Last Message: 12/2/2014
 |  Comments: 4
Page 1 / 2   >   >>


When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25533
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
CVE-2021-3162
PUBLISHED: 2021-01-15
Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.
CVE-2021-21242
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
CVE-2021-21245
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...
CVE-2021-21246
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check to make sure that only administrators can list user details. However for the `/users/` endpoint there are no security checks enforced so it is possible to retrieve ar...