Dark Reading Article Boards

Message Boards posted in February 2018
Page 1 / 2   >   >>
Zero-Day Attacks Major Concern in Hybrid Cloud
Last Message: 2/28/2018
 |  Comments: 1
SAML Flaw Lets Hackers Assume Users' Identities
Last Message: 2/28/2018
 |  Comments: 1
Security Starts with the User Experience
Last Message: 2/28/2018
 |  Comments: 2
Mac Malware Reaches New Highs
Last Message: 2/28/2018
 |  Comments: 1
7 Cryptominers & Cryptomining Botnets You Can't Ignore
Last Message: 2/27/2018
 |  Comments: 1
Threats from Mobile Ransomware & Banking Malware Are Growing
Last Message: 2/27/2018
 |  Comments: 5
93% of Cloud Applications Aren't Enterprise-Ready
Last Message: 2/26/2018
 |  Comments: 10
Visa: EMV Cards Drove 70% Decline in Fraud
Last Message: 2/26/2018
 |  Comments: 6
Takeaways from the Russia-Linked US Senate Phishing Attacks
Last Message: 2/25/2018
 |  Comments: 7
6 Steps for Sharing Threat Intelligence
Last Message: 2/22/2018
 |  Comments: 2
Write A Caption & Win A Prize
Last Message: 2/22/2018
 |  Comments: 125
Cybersecurity's 'Broken' Hiring Process
Last Message: 2/21/2018
 |  Comments: 14
Thinking about a Career Move in Cybersecurity?
Last Message: 2/21/2018
 |  Comments: 6
Facebook Aims to Make Security More Social
Last Message: 2/21/2018
 |  Comments: 2
13 Russians Indicted for Massive Operation to Sway US Election
Last Message: 2/20/2018
 |  Comments: 6
Ransomware Will Target Backups: 4 Ways to Protect Your Data
Last Message: 2/19/2018
 |  Comments: 1
FedEx Customer Data Exposed on Unsecured S3 Server
Last Message: 2/18/2018
 |  Comments: 1
Hacked Robots Present a New Insider Threat
Last Message: 2/17/2018
 |  Comments: 22
3 Steps to Reduce Risk in Your Supply Chain
Last Message: 2/17/2018
 |  Comments: 1
Sacramento Bee Databases Hit with Ransomware Attack
Last Message: 2/17/2018
 |  Comments: 3
Windows 10 Critical Vulnerability Reports Grew 64% in 2017
Last Message: 2/16/2018
 |  Comments: 1
Air Force Awards $12,500 for One Bug
Last Message: 2/16/2018
 |  Comments: 1
DoubleLocker Delivers Unique Two-Punch Hit to Android
Last Message: 2/16/2018
 |  Comments: 1
7 Ways to Maximize Your Security Dollars
Last Message: 2/15/2018
 |  Comments: 1
The 7 Most Common RATS In Use Today
Last Message: 2/15/2018
 |  Comments: 3
Hackers' Typo Foils Their $1 Billion Wire Transfer Heist
Last Message: 2/15/2018
 |  Comments: 6
AutoSploit: Mass Exploitation Just Got a Lot Easier
Last Message: 2/15/2018
 |  Comments: 5
Security Worries? Let Policies Automate the Right Thing
Last Message: 2/14/2018
 |  Comments: 7
As Primaries Loom, Election Security Efforts Behind Schedule
Last Message: 2/14/2018
 |  Comments: 1
Security vs. Speed: The Risk of Rushing to the Cloud
Last Message: 2/14/2018
 |  Comments: 6
One in Three SOC Analysts Now Job-Hunting
Last Message: 2/13/2018
 |  Comments: 1
The Problem with Data
Last Message: 2/11/2018
 |  Comments: 1
Businesses Fear Brand Damage More Than Security Breaches
Last Message: 2/11/2018
 |  Comments: 6
8 Nation-State Hacking Groups to Watch in 2018
Last Message: 2/9/2018
 |  Comments: 1
Tennessee Hospital Hit With Cryptocurrency Mining Malware
Last Message: 2/8/2018
 |  Comments: 2
Identity And Access Management Market Heats Up
Last Message: 2/7/2018
 |  Comments: 5
One Identity Acquires Balabit
Last Message: 2/7/2018
 |  Comments: 1
Meet Chronicle: Alphabet's New Cybersecurity Business
Last Message: 2/7/2018
 |  Comments: 1
Page 1 / 2   >   >>


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Risk, Privacy, and Information Security Officer, AvePoint, Inc.,  8/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-17305
PUBLISHED: 2018-08-21
Some Huawei Firewall products USG2205BSR V300R001C10SPC600; USG2220BSR V300R001C00; USG5120BSR V300R001C00; USG5150BSR V300R001C00 have a Bleichenbacher Oracle vulnerability in the IPSEC IKEv1 implementations. Remote attackers can decrypt IPSEC tunnel ciphertext data by leveraging a Bleichenbacher R...
CVE-2017-17311
PUBLISHED: 2018-08-21
Some Huawei Firewall products USG2205BSR V300R001C10SPC600; USG2220BSR V300R001C00; USG5120BSR V300R001C00; USG5150BSR V300R001C00 have a DoS vulnerability in the IPSEC IKEv1 implementations of Huawei Firewall products. Due to improper handling of the malformed messages, an attacker may sent crafted...
CVE-2017-17312
PUBLISHED: 2018-08-21
Some Huawei Firewall products USG2205BSR V300R001C10SPC600; USG2220BSR V300R001C00; USG5120BSR V300R001C00; USG5150BSR V300R001C00 have a DoS vulnerability in the IPSEC IKEv1 implementations of Huawei Firewall products. Due to improper handling of the malformed messages, an attacker may sent crafted...
CVE-2018-12115
PUBLISHED: 2018-08-21
In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second...
CVE-2018-7166
PUBLISHED: 2018-08-21
In all versions of Node.js 10 prior to 10.9.0, an argument processing flaw can cause `Buffer.alloc()` to return uninitialized memory. This method is intended to be safe and only return initialized, or cleared, memory. The third argument specifying `encoding` can be passed as a number, this is misint...