Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in December 2017
Page 1 / 2   >   >>
US Census Bureau: Data Exposed in Alteryx Leak Already Public
Last Message: 12/31/2017
 |  Comments: 11
Network Printer & Scanner Spoofing Campaign Targets Millions
Last Message: 12/29/2017
 |  Comments: 1
Mozilla Issues Critical Security Patch for Thunderbird Flaw
Last Message: 12/29/2017
 |  Comments: 1
8 Out of 10 Employees Use Unencrypted USB Devices
Last Message: 12/28/2017
 |  Comments: 1
CISO Holiday Miracle Wish List
Last Message: 12/27/2017
 |  Comments: 1
Facebook Helps Users Detect Phishing Emails
Last Message: 12/27/2017
 |  Comments: 8
Be a More Effective CISO by Aligning Security to the Business
Last Message: 12/25/2017
 |  Comments: 6
Five Arrested for Cerber, CTB-Locker Ransomware Spread
Last Message: 12/24/2017
 |  Comments: 7
80% of Americans Admit to Risky Cybersecurity Behaviors
Last Message: 12/20/2017
 |  Comments: 4
Kaspersky Lab Files Lawsuit Over DHS Ban of its Products
Last Message: 12/19/2017
 |  Comments: 1
Security Geek Gift Guide
Last Message: 12/18/2017
 |  Comments: 1
2 Million Fake Net Neutrality Comments Stole American Identities
Last Message: 12/18/2017
 |  Comments: 4
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Last Message: 12/18/2017
 |  Comments: 8
19 M California Voter Records Held for Ransom in MongoDB Attack
Last Message: 12/18/2017
 |  Comments: 1
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Last Message: 12/15/2017
 |  Comments: 2
Malware Decompiler Tool Goes Open Source
Last Message: 12/15/2017
 |  Comments: 1
Healthcare Faces Poor Cybersecurity Prognosis
Last Message: 12/14/2017
 |  Comments: 1
Uber's Security Slip-ups: What Went Wrong
Last Message: 12/14/2017
 |  Comments: 2
Security Compliance: The Less You Spend the More You Pay
Last Message: 12/14/2017
 |  Comments: 1
Lack of Experience Biggest Obstacle for InfoSec Career
Last Message: 12/13/2017
 |  Comments: 3
Dark Reading Launches New Conference on Cyber Defense
Last Message: 12/13/2017
 |  Comments: 8
Cybersecurity's Ceiling
Last Message: 12/13/2017
 |  Comments: 7
Oracle Product Rollout Underscores Need for Trust in the Cloud
Last Message: 12/13/2017
 |  Comments: 1
Throw Out the Playbooks to Win at Incident Response
Last Message: 12/13/2017
 |  Comments: 5
Hacking the Security Job Application Process
Last Message: 12/13/2017
 |  Comments: 1
A Call for New Voices on the Security Conference Circuit
Last Message: 12/13/2017
 |  Comments: 4
Security Training & Awareness: 3 Big Myths
Last Message: 12/13/2017
 |  Comments: 6
Preventing Credential Theft: A Security Checklist for Boards
Last Message: 12/13/2017
 |  Comments: 1
Mischel Kwon Unplugged
Last Message: 12/13/2017
 |  Comments: 1
Hiring Outside the Box in Cybersecurity
Last Message: 12/13/2017
 |  Comments: 2
Only 5% of Business Leaders Rethought Security After Equifax
Last Message: 12/12/2017
 |  Comments: 1
5 Free or Low-Cost Security Tools for Defenders
Last Message: 12/12/2017
 |  Comments: 1
Nearly 2/3 of Industrial Companies Lack Security Monitoring
Last Message: 12/12/2017
 |  Comments: 1
10 Essential Elements For Your Incident-Response Plan
Last Message: 12/11/2017
 |  Comments: 1
Emerging IT Security Technologies: 13 Categories, 26 Vendors
Last Message: 12/8/2017
 |  Comments: 1
Why Cybersecurity Must Be an International Effort
Last Message: 12/7/2017
 |  Comments: 1
3 Ways to Retain Security Operations Staff
Last Message: 12/7/2017
 |  Comments: 10
3 Ways your Phishing Defense Can Be like the Marines
Last Message: 12/5/2017
 |  Comments: 1
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-24999
PUBLISHED: 2022-11-26
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query strin...
CVE-2022-45909
PUBLISHED: 2022-11-26
drachtio-server 0.8.18 has a heap-based buffer over-read via a long Request-URI in an INVITE request.
CVE-2022-45907
PUBLISHED: 2022-11-26
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.
CVE-2022-45908
PUBLISHED: 2022-11-26
In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.
CVE-2022-44843
PUBLISHED: 2022-11-25
TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the port parameter in the setting/setOpenVpnClientCfg function.