Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in February 2015
Page 1 / 2   >   >>
Hits Keep On Coming For Both SSL & Its Abusers
Last Message: 2/27/2015
 |  Comments: 4
Millions Of Non-Anthem Customers Also Hit By Anthem Breach
Last Message: 2/27/2015
 |  Comments: 4
Customers Arent the Only Victims: 5 Stages Of Data Breach Grief
Last Message: 2/27/2015
 |  Comments: 3
7 Things You Should Know About Secure Payment Technology
Last Message: 2/27/2015
 |  Comments: 14
How Anthem Shared Key Markers Of Its Cyberattack
Last Message: 2/26/2015
 |  Comments: 1
Who Cares Whos Behind A Data Breach?
Last Message: 2/26/2015
 |  Comments: 27
Superfish Compromises All SSL Connections on Lenovo Gear
Last Message: 2/26/2015
 |  Comments: 10
End Users Causing Bulk Of Infosec Headaches
Last Message: 2/26/2015
 |  Comments: 10
Cybercrime, Cyber Espionage Tactics Converge
Last Message: 2/25/2015
 |  Comments: 3
Blackhat, The Movie: Good, Bad & Ridiculous
Last Message: 2/24/2015
 |  Comments: 2
Our Governments Are Making Us More Vulnerable
Last Message: 2/23/2015
 |  Comments: 11
How To Get More Involved In The IT Security Community
Last Message: 2/20/2015
 |  Comments: 6
Newly Discovered 'Master' Cyber Espionage Group Trumps Stuxnet
Last Message: 2/19/2015
 |  Comments: 13
Why The USA Hacks
Last Message: 2/19/2015
 |  Comments: 7
A Look At Sony Wiper In Action
Last Message: 2/18/2015
 |  Comments: 2
How To Get More Involved In the IT Security Community
Last Message: 2/18/2015
 |  Comments: 77
Sony Hack: Poster Child For A New Era Of Cyber Attacks
Last Message: 2/17/2015
 |  Comments: 4
Why Israel Hacks
Last Message: 2/17/2015
 |  Comments: 3
P.F. Chang's Breach Went Undetected For Months
Last Message: 2/17/2015
 |  Comments: 4
How Malware Bypasses Our Most Advanced Security Measures
Last Message: 2/13/2015
 |  Comments: 8
Obama Launches Cyberthreat Intel-Sharing Center
Last Message: 2/12/2015
 |  Comments: 3
Bridging the Cybersecurity Skills Gap: 3 Big Steps
Last Message: 2/11/2015
 |  Comments: 4
A Winning Strategy: Must Patch, Should Patch, Can't Patch
Last Message: 2/11/2015
 |  Comments: 2
Browsers Are The Window To Enterprise Infection
Last Message: 2/10/2015
 |  Comments: 9
Box Giving Customers Control Over Encryption Keys
Last Message: 2/10/2015
 |  Comments: 1
3 Disturbing New Trends in Vulnerability Disclosure
Last Message: 2/8/2015
 |  Comments: 7
BMW's Software Security Patch A Sign Of Things To Come
Last Message: 2/7/2015
 |  Comments: 8
Sony Exec Resigns Post In Wake Of Data Breach
Last Message: 2/6/2015
 |  Comments: 2
How The Skills Shortage Is Killing Defense in Depth
Last Message: 2/6/2015
 |  Comments: 12
Small Changes Can Make A Big Difference In Tech Diversity
Last Message: 2/5/2015
 |  Comments: 6
Google Paid Over $1.5 Million In Bug Bounties In 2014
Last Message: 2/5/2015
 |  Comments: 5
Report: Russian Hacker Broke Into Sony & Is Still There
Last Message: 2/5/2015
 |  Comments: 2
Shifting Paradigms: The Case for Cyber Counter-Intelligence
Last Message: 2/5/2015
 |  Comments: 2
Scan Finds 'Ghost' Haunting Critical Business Applications
Last Message: 2/5/2015
 |  Comments: 2
Why Russia Hacks
Last Message: 2/5/2015
 |  Comments: 17
Gas Stations Urged To Secure Exposed Fuel Tank Devices
Last Message: 2/5/2015
 |  Comments: 11
Enterprises Underestimate Actual Shadow Cloud Risks
Last Message: 2/5/2015
 |  Comments: 3
Page 1 / 2   >   >>


When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25533
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
CVE-2021-3162
PUBLISHED: 2021-01-15
Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.
CVE-2021-21242
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
CVE-2021-21245
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...
CVE-2021-21246
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check to make sure that only administrators can list user details. However for the `/users/` endpoint there are no security checks enforced so it is possible to retrieve ar...