Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in April 2018
Page 1 / 2   >   >>
12 Trends Shaping Identity Management
Last Message: 4/30/2018
 |  Comments: 1
How Microsoft, Amazon, Alphabet Are Reshaping Security
Last Message: 4/30/2018
 |  Comments: 1
Slack Releases Open Source SDL Tool
Last Message: 4/30/2018
 |  Comments: 1
Old Worm, New Tricks: FacexWorm Targets Crypto Platforms
Last Message: 4/30/2018
 |  Comments: 2
'Zero Login:' The Rise of Invisible Identity
Last Message: 4/30/2018
 |  Comments: 1
More Than 1M Children Victims of Identity Fraud in 2017
Last Message: 4/30/2018
 |  Comments: 2
Routing Security Gets Boost with New Set of MANRS for IXPs
Last Message: 4/30/2018
 |  Comments: 1
Yahoo to Pay SEC Fine of $35 Million
Last Message: 4/30/2018
 |  Comments: 2
Why Information Integrity Attacks Pose New Security Challenges
Last Message: 4/28/2018
 |  Comments: 3
8 Ways Hackers Monetize Stolen Data
Last Message: 4/27/2018
 |  Comments: 4
Europe and Asia Take on More DDoS Attacks
Last Message: 4/27/2018
 |  Comments: 1
Threat Intel: Finding Balance in an Overcrowded Market
Last Message: 4/25/2018
 |  Comments: 2
Securing Social Media: National Safety, Privacy Concerns
Last Message: 4/24/2018
 |  Comments: 2
New Malware Adds RAT to a Persistent Loader
Last Message: 4/21/2018
 |  Comments: 1
Oracle CPU Contains Lowest Number Of Database Fixes Ever
Last Message: 4/21/2018
 |  Comments: 1
OSX.Bella: Mac Malware Strikes Again
Last Message: 4/21/2018
 |  Comments: 1
Microsoft CISO Talks Threat Intel, 'Data Inclusion'
Last Message: 4/20/2018
 |  Comments: 2
On-Premise Security Tools Struggle to Survive in the Cloud
Last Message: 4/19/2018
 |  Comments: 1
The Role of KPIs in Incident Response
Last Message: 4/19/2018
 |  Comments: 1
Optimizing the Security Awareness of Your End-Users
Last Message: 4/19/2018
 |  Comments: 1
7 Non-Financial Data Types to Secure
Last Message: 4/18/2018
 |  Comments: 1
Avoiding the Ransomware Mistakes that Crippled Atlanta
Last Message: 4/17/2018
 |  Comments: 8
Can Android for Work Redefine Enterprise Mobile Security?
Last Message: 4/15/2018
 |  Comments: 2
Cartoon: Reverse Ransomware
Last Message: 4/13/2018
 |  Comments: 4
Microsegmentation: Strong Security in Small Packages
Last Message: 4/12/2018
 |  Comments: 1
Stripping the Attacker Naked
Last Message: 4/11/2018
 |  Comments: 5
89% of Android Users Didn't Consent to Facebook Data Collection
Last Message: 4/11/2018
 |  Comments: 4
One-Third of Internal User Accounts Are 'Ghost Users'
Last Message: 4/11/2018
 |  Comments: 4
Best Buy the Latest Victim of Third-Party Security Breach
Last Message: 4/10/2018
 |  Comments: 1
Mirai Variant Botnet Takes Aim at Financials
Last Message: 4/6/2018
 |  Comments: 1
Report: White House Email Domains Poorly Protected from Fraud
Last Message: 4/6/2018
 |  Comments: 2
3 Security Measures That Can Actually Be Measured
Last Message: 4/5/2018
 |  Comments: 2
How Gamers Could Save the Cybersecurity Skills Gap
Last Message: 4/5/2018
 |  Comments: 1
University Networks Become Fertile Ground for Cryptomining
Last Message: 4/5/2018
 |  Comments: 4
The Cybersecurity Mandates Keep On Coming
Last Message: 4/5/2018
 |  Comments: 3
FBI IC3: Tech Support Scam Losses Rose 86% in 2017
Last Message: 4/4/2018
 |  Comments: 2
7 Deadly Security Sins of Web Applications
Last Message: 4/4/2018
 |  Comments: 1
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...