Dark Reading Article Boards

Message Boards posted in February 2016
Page 1 / 2   >   >>
CISO Still Viewed As Tech Not Business Leader
Last Message: 2/29/2016
 |  Comments: 1
Security Lessons From My Doctor
Last Message: 2/29/2016
 |  Comments: 12
The ROI Of Infosec: 11 Dos and Donts For Management Buy In
Last Message: 2/29/2016
 |  Comments: 3
Modern Web Apps: Not The Risk They Used To Be (Theyre Worse!)
Last Message: 2/29/2016
 |  Comments: 2
Measuring Security: My Dwell Time Obsession
Last Message: 2/29/2016
 |  Comments: 1
Encryption Adoption On The Rise
Last Message: 2/29/2016
 |  Comments: 2
5 Reasons SAP Security Matters
Last Message: 2/28/2016
 |  Comments: 1
2015: The Year Of 'Attacks on Trust'
Last Message: 2/28/2016
 |  Comments: 1
The Rise Of Social Media Botnets
Last Message: 2/26/2016
 |  Comments: 1
'MouseJack' Attack Bites Non-Bluetooth Wireless Mice
Last Message: 2/25/2016
 |  Comments: 9
New Study Shows Mobile Devices The Cause Of Some Data Breaches
Last Message: 2/25/2016
 |  Comments: 1
Newly Fired CEO Of Norse Fires Back At Critics
Last Message: 2/24/2016
 |  Comments: 2
FAQ: Heres What You Need To Know About The Apple, FBI Dispute
Last Message: 2/24/2016
 |  Comments: 2
Anatomy Of An Account Takeover Attack
Last Message: 2/23/2016
 |  Comments: 1
Today's New Payment Card Security In A Nutshell
Last Message: 2/23/2016
 |  Comments: 1
Security Lessons From My Car Mechanic
Last Message: 2/22/2016
 |  Comments: 8
A Proactive Approach To Incident Response: 7 Benefits
Last Message: 2/22/2016
 |  Comments: 1
Prepared for a Cyberattack?
Last Message: 2/21/2016
 |  Comments: 1
The Secret Life Of Stolen Credentials
Last Message: 2/19/2016
 |  Comments: 1
Here Comes Locky, A Brand New Ransomware Threat
Last Message: 2/19/2016
 |  Comments: 2
5 Big Incident Response Mistakes
Last Message: 2/19/2016
 |  Comments: 2
20 Cybersecurity Startups To Watch In 2016
Last Message: 2/18/2016
 |  Comments: 2
5 Exploit Trends Driving Attacks Today
Last Message: 2/18/2016
 |  Comments: 1
Hollywood Hospital Hit By Ransomware Attack, FBI Investigates
Last Message: 2/17/2016
 |  Comments: 3
Security and the Network
Last Message: 2/17/2016
 |  Comments: 26
Online 'Batman' Takes On Dridex Banking Trojan Operators
Last Message: 2/16/2016
 |  Comments: 3
Quick Guide To Cyber Insurance Shopping
Last Message: 2/16/2016
 |  Comments: 1
More Reasons To Drop The War On Encryption
Last Message: 2/16/2016
 |  Comments: 15
Simplifying Application Security: 4 Steps
Last Message: 2/16/2016
 |  Comments: 2
Perceptions Of IT Risk Changing In Business Ranks
Last Message: 2/15/2016
 |  Comments: 1
New White House Cybersecurity Plan Creates Federal CISO
Last Message: 2/14/2016
 |  Comments: 2
3 Flavors of Machine Learning: Who, What & Where
Last Message: 2/14/2016
 |  Comments: 1
Is The Cybersecurity Bubble About To Burst?
Last Message: 2/12/2016
 |  Comments: 5
"Petraeus Fallout: 5 Gmail Security Facts"
Last Message: 2/10/2016
 |  Comments: 15
Cybercrime Doesn't Pay As Much As You'd Think
Last Message: 2/10/2016
 |  Comments: 7
US DOJ, DHS Yet To Confirm Breach, Leak
Last Message: 2/9/2016
 |  Comments: 1
Monday Morning Quarterbacking Super Bowl 50: Infosec Edition
Last Message: 2/9/2016
 |  Comments: 1
"Google's Privacy Invasion: It's Your Fault"
Last Message: 2/8/2016
 |  Comments: 31
Lights Out: Not So Fast
Last Message: 2/4/2016
 |  Comments: 3
Chipping Away At Credit Card Fraud With EMV
Last Message: 2/4/2016
 |  Comments: 1
Page 1 / 2   >   >>


High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
CVE-2013-7469
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2018-20146
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
CVE-2019-5727
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.