Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in April 2019
Page 1 / 3   >   >>
IT Leaders, Employees Divided on Data Security
Last Message: 4/30/2019
 |  Comments: 4
Confluence Vulnerability Opens Door to GandCrab
Last Message: 4/30/2019
 |  Comments: 1
Yahoo Sued By User Over 2014 Hacking
Last Message: 4/30/2019
 |  Comments: 1
App Exposes Wi-Fi Credentials for Thousands of Private Networks
Last Message: 4/30/2019
 |  Comments: 2
This Week in Security Funding: Where the Money Went
Last Message: 4/30/2019
 |  Comments: 2
Slack Warns of Big, Bad Dangers in SEC Filing
Last Message: 4/29/2019
 |  Comments: 1
Docker Forces Password Reset for 190,000 Accounts After Breach
Last Message: 4/29/2019
 |  Comments: 1
Security Vulns in Microsoft Products Continue to Increase
Last Message: 4/29/2019
 |  Comments: 1
New Zombie 'POODLE' Attack Bred from TLS Flaw
Last Message: 4/29/2019
 |  Comments: 1
7 Malware Families Ready to Ruin Your IoT's Day
Last Message: 4/29/2019
 |  Comments: 2
Quantum Computing and Code-Breaking
Last Message: 4/29/2019
 |  Comments: 1
Pwn2Own: Tesla Hack, Broken VMs, and Skewed Economics
Last Message: 4/29/2019
 |  Comments: 1
7 Ways to Get the Most from Your IDS/IPS
Last Message: 4/29/2019
 |  Comments: 1
55% of SMBs Would Pay Up Post-Ransomware Attack
Last Message: 4/28/2019
 |  Comments: 8
When Every Attack Is a Zero Day
Last Message: 4/27/2019
 |  Comments: 3
5 Security Challenges to API Protection
Last Message: 4/27/2019
 |  Comments: 1
New Twist in the Stuxnet Story
Last Message: 4/26/2019
 |  Comments: 3
Two Charged with Economic Espionage, GE Trade Secret Theft
Last Message: 4/26/2019
 |  Comments: 4
Google File Cabinet Plays Host to Malware Payloads
Last Message: 4/26/2019
 |  Comments: 5
Go Medieval to Keep OT Safe
Last Message: 4/26/2019
 |  Comments: 1
IoT Security's Coming of Age Is Overdue
Last Message: 4/26/2019
 |  Comments: 7
Sensitive Data Lingers on Used Storage Drives Sold Online
Last Message: 4/26/2019
 |  Comments: 2
Inside Incident Response: 6 Key Tips to Keep in Mind
Last Message: 4/26/2019
 |  Comments: 2
Python-Based Bot Scanner Gorging on Recon Intel
Last Message: 4/26/2019
 |  Comments: 1
Russia Regularly Spoofs Regional GPS
Last Message: 4/24/2019
 |  Comments: 7
City of Stuart Still Recovering from Ryuk Ransomware Attack
Last Message: 4/23/2019
 |  Comments: 1
Police Pay Off Ransomware Operators, Again
Last Message: 4/23/2019
 |  Comments: 3
FBI: $2.7 Billion in Losses to Cyber-Enabled Crimes in 2018
Last Message: 4/23/2019
 |  Comments: 1
1 in 4 Workers Are Aware Of Security Guidelines but Ignore Them
Last Message: 4/23/2019
 |  Comments: 1
Why We Need a 'Cleaner Internet'
Last Message: 4/23/2019
 |  Comments: 3
4 Tips to Protect Your Business Against Social Media Mistakes
Last Message: 4/23/2019
 |  Comments: 1
6 Essential Skills Cybersecurity Pros Need to Develop in 2019
Last Message: 4/22/2019
 |  Comments: 2
Android Phones Now Double as Physical Security Keys
Last Message: 4/22/2019
 |  Comments: 1
Free Princeton Application Provides IoT Traffic Insight
Last Message: 4/22/2019
 |  Comments: 1
APT34 Toolset, Victim Data Leaked via Telegram
Last Message: 4/22/2019
 |  Comments: 1
The Cybersecurity Automation Paradox
Last Message: 4/22/2019
 |  Comments: 1
A Glass Ceiling? Not in Privacy
Last Message: 4/22/2019
 |  Comments: 1
Tips for the Aftermath of a Cyberattack
Last Message: 4/21/2019
 |  Comments: 3
Turn Off FaceTime in Apple iOS Now, Experts Warn
Last Message: 4/21/2019
 |  Comments: 3
Page 1 / 3   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...