Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in March 2020
Page 1 / 2   >   >>
Patching Poses Security Problems with Move to More Remote Work
Last Message: 3/31/2020
 |  Comments: 1
Microsoft Edge Will Tell You If Credentials Are Compromised
Last Message: 3/31/2020
 |  Comments: 11
Keeping a Strong Security Metrics Framework Strong
Last Message: 3/31/2020
 |  Comments: 2
Security Industry Takes Steps To Close Gender Gap
Last Message: 3/31/2020
 |  Comments: 2
Introducing Zero-Trust Access
Last Message: 3/31/2020
 |  Comments: 7
Security Not a Priority for SAP Projects, Users Report
Last Message: 3/31/2020
 |  Comments: 8
Closing The Cybersecurity Skills Gap With STEM
Last Message: 3/31/2020
 |  Comments: 4
Missing Patches, Misconfiguration Top Technical Breach Causes
Last Message: 3/31/2020
 |  Comments: 1
HP Launches Printer Bug Bounty Program
Last Message: 3/31/2020
 |  Comments: 3
Malicious USB Drive Hides Behind Gift Card Lure
Last Message: 3/30/2020
 |  Comments: 11
The State of Application Penetration Testing
Last Message: 3/30/2020
 |  Comments: 1
Preparing For The Future Of Online Threats
Last Message: 3/30/2020
 |  Comments: 14
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Last Message: 3/28/2020
 |  Comments: 3
Time to Get Smarter About Threat Intel
Last Message: 3/28/2020
 |  Comments: 3
VPN Usage Surges as More Nations Shut Down Offices
Last Message: 3/27/2020
 |  Comments: 2
FBI Shutters Russian-Based Hacker Platform, Makes Arrest
Last Message: 3/26/2020
 |  Comments: 1
How to Get the Most Out of Your Security Metrics
Last Message: 3/26/2020
 |  Comments: 2
200M Records of US Citizens Leaked in Unprotected Database
Last Message: 3/26/2020
 |  Comments: 2
Beyond Burnout: What Is Cybersecurity Doing to Us?
Last Message: 3/25/2020
 |  Comments: 1
Keys to Hiring Cybersecurity Pros When Certification Can't Help
Last Message: 3/25/2020
 |  Comments: 1
Security Ratings Are a Dangerous Fantasy
Last Message: 3/24/2020
 |  Comments: 1
Security 101: How Businesses and Schools Bridge the Talent Gap
Last Message: 3/24/2020
 |  Comments: 1
8 Infosec Page-Turners for Days Spent Indoors
Last Message: 3/23/2020
 |  Comments: 2
Dark Reading Cybersecurity Crossword Puzzle
Last Message: 3/23/2020
 |  Comments: 1
Move Over, Mirai: Persirai Now the Top IP Camera Botnet
Last Message: 3/22/2020
 |  Comments: 1
Analyzing Cybersecurity's Fractured Educational Ecosystem
Last Message: 3/21/2020
 |  Comments: 7
Millennials, Women May Bridge Cyber Talent Gap
Last Message: 3/21/2020
 |  Comments: 1
Achieving DevSecOps Requires Cutting Through the Jargon
Last Message: 3/20/2020
 |  Comments: 2
Quantifying Cyber Risk: Why You Must & Where to Start
Last Message: 3/20/2020
 |  Comments: 1
DDoS Attack Targets German Food Delivery Service
Last Message: 3/20/2020
 |  Comments: 2
Remote Workforce Jumps 15% In Two Weeks
Last Message: 3/20/2020
 |  Comments: 2
4 Tips to Run Fast in the Face of Digital Transformation
Last Message: 3/19/2020
 |  Comments: 2
6 Steps CISOs Should Take to Secure Their OT Systems
Last Message: 3/19/2020
 |  Comments: 3
Breach in Stanford System Exposes Student Records
Last Message: 3/19/2020
 |  Comments: 1
The Three Dimensions of the Threat Intelligence Scale Problem
Last Message: 3/19/2020
 |  Comments: 7
Many Ransomware Attacks Can be Stopped Before They Begin
Last Message: 3/18/2020
 |  Comments: 3
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...