Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in April 2018
Page 1 / 2   >   >>
12 Trends Shaping Identity Management
Last Message: 4/30/2018
 |  Comments: 1
How Microsoft, Amazon, Alphabet Are Reshaping Security
Last Message: 4/30/2018
 |  Comments: 1
Slack Releases Open Source SDL Tool
Last Message: 4/30/2018
 |  Comments: 1
Old Worm, New Tricks: FacexWorm Targets Crypto Platforms
Last Message: 4/30/2018
 |  Comments: 2
'Zero Login:' The Rise of Invisible Identity
Last Message: 4/30/2018
 |  Comments: 1
More Than 1M Children Victims of Identity Fraud in 2017
Last Message: 4/30/2018
 |  Comments: 2
Routing Security Gets Boost with New Set of MANRS for IXPs
Last Message: 4/30/2018
 |  Comments: 1
Yahoo to Pay SEC Fine of $35 Million
Last Message: 4/30/2018
 |  Comments: 2
Why Information Integrity Attacks Pose New Security Challenges
Last Message: 4/28/2018
 |  Comments: 3
8 Ways Hackers Monetize Stolen Data
Last Message: 4/27/2018
 |  Comments: 4
Europe and Asia Take on More DDoS Attacks
Last Message: 4/27/2018
 |  Comments: 1
Threat Intel: Finding Balance in an Overcrowded Market
Last Message: 4/25/2018
 |  Comments: 2
Securing Social Media: National Safety, Privacy Concerns
Last Message: 4/24/2018
 |  Comments: 2
New Malware Adds RAT to a Persistent Loader
Last Message: 4/21/2018
 |  Comments: 1
Oracle CPU Contains Lowest Number Of Database Fixes Ever
Last Message: 4/21/2018
 |  Comments: 1
OSX.Bella: Mac Malware Strikes Again
Last Message: 4/21/2018
 |  Comments: 1
Microsoft CISO Talks Threat Intel, 'Data Inclusion'
Last Message: 4/20/2018
 |  Comments: 2
On-Premise Security Tools Struggle to Survive in the Cloud
Last Message: 4/19/2018
 |  Comments: 1
The Role of KPIs in Incident Response
Last Message: 4/19/2018
 |  Comments: 1
Optimizing the Security Awareness of Your End-Users
Last Message: 4/19/2018
 |  Comments: 1
7 Non-Financial Data Types to Secure
Last Message: 4/18/2018
 |  Comments: 1
Avoiding the Ransomware Mistakes that Crippled Atlanta
Last Message: 4/17/2018
 |  Comments: 8
Can Android for Work Redefine Enterprise Mobile Security?
Last Message: 4/15/2018
 |  Comments: 2
Microsegmentation: Strong Security in Small Packages
Last Message: 4/12/2018
 |  Comments: 1
Stripping the Attacker Naked
Last Message: 4/11/2018
 |  Comments: 5
89% of Android Users Didn't Consent to Facebook Data Collection
Last Message: 4/11/2018
 |  Comments: 4
One-Third of Internal User Accounts Are 'Ghost Users'
Last Message: 4/11/2018
 |  Comments: 4
Best Buy the Latest Victim of Third-Party Security Breach
Last Message: 4/10/2018
 |  Comments: 1
Mirai Variant Botnet Takes Aim at Financials
Last Message: 4/6/2018
 |  Comments: 1
Report: White House Email Domains Poorly Protected from Fraud
Last Message: 4/6/2018
 |  Comments: 2
How Gamers Could Save the Cybersecurity Skills Gap
Last Message: 4/5/2018
 |  Comments: 1
University Networks Become Fertile Ground for Cryptomining
Last Message: 4/5/2018
 |  Comments: 4
The Cybersecurity Mandates Keep On Coming
Last Message: 4/5/2018
 |  Comments: 3
FBI IC3: Tech Support Scam Losses Rose 86% in 2017
Last Message: 4/4/2018
 |  Comments: 2
7 Deadly Security Sins of Web Applications
Last Message: 4/4/2018
 |  Comments: 1
Destructive and False Flag Cyberattacks to Escalate
Last Message: 4/2/2018
 |  Comments: 10
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21742
PUBLISHED: 2021-09-25
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.
CVE-2020-20508
PUBLISHED: 2021-09-24
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
CVE-2020-20514
PUBLISHED: 2021-09-24
A Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/<id>.html allows authenticated attackers to delete all users.
CVE-2016-6555
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the events list page. This issue was fixed in ver...
CVE-2016-6556
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when a user of the web UI views the data. This iss...