Dark Reading Article Boards

Message Boards posted in March 2018
Page 1 / 2   >   >>
Tracking Bitcoin Wallets as IOCs for Ransomware
Last Message: 3/31/2018
 |  Comments: 1
Privacy: Do We Need a National Data Breach Disclosure Law?
Last Message: 3/30/2018
 |  Comments: 15
7 University-Connected Cyber Ranges to Know Now
Last Message: 3/30/2018
 |  Comments: 1
MITRE Evaluates Tools for APT Detection
Last Message: 3/30/2018
 |  Comments: 1
Accused Yahoo Hacker May Comply with US Extradition
Last Message: 3/30/2018
 |  Comments: 1
Attacking Data Integrity & Hacking Radiation Monitoring Devices
Last Message: 3/30/2018
 |  Comments: 1
8 Security Spring Cleaning Tips for the Home Office
Last Message: 3/29/2018
 |  Comments: 1
Critical Start to Buy Advanced Threat Analytics
Last Message: 3/29/2018
 |  Comments: 1
The Containerization of Artificial Intelligence
Last Message: 3/29/2018
 |  Comments: 1
A Look at Cybercrime's Banal Nature
Last Message: 3/29/2018
 |  Comments: 3
How Measuring Security for Risk & ROI Can Empower CISOs
Last Message: 3/29/2018
 |  Comments: 1
AI and Machine Learning: Breaking Down Buzzwords
Last Message: 3/29/2018
 |  Comments: 2
Preparing Security For Windows 7 End-Of-Life Support
Last Message: 3/29/2018
 |  Comments: 2
UVA Defeats UMBC, in Stunning Upset
Last Message: 3/28/2018
 |  Comments: 1
Attackers Shift From Adobe Flaws to Microsoft Products
Last Message: 3/28/2018
 |  Comments: 1
Anthem Hit with Data Breach of 18,580 Medicare Members
Last Message: 3/27/2018
 |  Comments: 2
Looking Back to Look Ahead: Cyber Threat Trends to Watch
Last Message: 3/26/2018
 |  Comments: 1
City of Atlanta Hit with Ransomware Attack
Last Message: 3/26/2018
 |  Comments: 3
How Cybercriminals Attack The Cloud
Last Message: 3/26/2018
 |  Comments: 1
Who Does What in Cybersecurity at the C-Level
Last Message: 3/24/2018
 |  Comments: 10
Online Ads vs. Security: An Invisible War
Last Message: 3/23/2018
 |  Comments: 2
SOC in Translation: 4 Common Phrases & Why They Raise Flags
Last Message: 3/23/2018
 |  Comments: 1
Is Application Security Dead?
Last Message: 3/22/2018
 |  Comments: 1
The Case for Integrating Physical Security & Cybersecurity
Last Message: 3/22/2018
 |  Comments: 2
Cyber Intelligence: Defining What You Know
Last Message: 3/21/2018
 |  Comments: 2
Death of the Tier 1 SOC Analyst
Last Message: 3/21/2018
 |  Comments: 3
First Example Of SAP Breach Surfaces
Last Message: 3/21/2018
 |  Comments: 1
7 Spectre/Meltdown Symptoms That Might Be Under Your Radar
Last Message: 3/20/2018
 |  Comments: 1
Connected Cars Pose New Security Challenges
Last Message: 3/20/2018
 |  Comments: 3
5 Steps to Improve Your Software Supply Chain Security
Last Message: 3/20/2018
 |  Comments: 1
Cybercriminals Launder Up to $200B in Profit Per Year
Last Message: 3/19/2018
 |  Comments: 1
How Security Metrics Fail Us & How We Fail Them
Last Message: 3/18/2018
 |  Comments: 6
Application of Threat Indicators: A Temporal View
Last Message: 3/18/2018
 |  Comments: 1
Top 8 Cybersecurity Skills IT Pros Need in 2018
Last Message: 3/17/2018
 |  Comments: 2
Microsoft Report Details Different Forms of Cryptominers
Last Message: 3/16/2018
 |  Comments: 2
Segmentation: The Neglected (Yet Essential) Control
Last Message: 3/16/2018
 |  Comments: 1
Google Chrome Patch Released
Last Message: 3/15/2018
 |  Comments: 1
Pragmatic Security: 20 Signs You Are 'Boiling the Ocean'
Last Message: 3/14/2018
 |  Comments: 11
Page 1 / 2   >   >>


Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
CVE-2018-19829
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-16884
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
CVE-2018-17777
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
CVE-2018-18921
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.