Dark Reading Article Boards

Message Boards posted in May 2016
Page 1 / 2   >   >>
SWIFT Proposes New Measures For Bolstering Its Security
Last Message: 5/31/2016
 |  Comments: 5
Insiders Involved In Bangladesh Bank Cyber Theft?
Last Message: 5/31/2016
 |  Comments: 1
Enterprises Must Consider Privacy Concern For Biometrics
Last Message: 5/31/2016
 |  Comments: 3
IoT Security By The Numbers
Last Message: 5/30/2016
 |  Comments: 2
More Banks May Have Been Hacked Via SWIFT
Last Message: 5/30/2016
 |  Comments: 2
USB-Charging 'Handshake' Exposes Smartphones To Infection
Last Message: 5/30/2016
 |  Comments: 1
Ultimate Guide To DDoS Protection: DDoS Is A Business Problem
Last Message: 5/29/2016
 |  Comments: 2
Cartoon: Infosec Multitasking
Last Message: 5/27/2016
 |  Comments: 10
What's At Risk When CISOs Say 'No'
Last Message: 5/27/2016
 |  Comments: 1
"10 Strategies To Fight Anonymous DDoS Attacks"
Last Message: 5/26/2016
 |  Comments: 11
A Newer Variant Of RawPOS: An In-Depth Look
Last Message: 5/26/2016
 |  Comments: 2
What IT Can Teach Utilities About Cybersecurity & Smart Grids
Last Message: 5/26/2016
 |  Comments: 11
7 Lessons From The Panama Papers Leak
Last Message: 5/26/2016
 |  Comments: 3
Google To Eliminate Passwords For Android Apps
Last Message: 5/25/2016
 |  Comments: 7
NBA Players' Financial Data Exposed In BEC Email Scam
Last Message: 5/25/2016
 |  Comments: 1
10 Years Of Human Hacking: How The USB Way Evolved
Last Message: 5/24/2016
 |  Comments: 6
Why Security Investigators Should Care About Forensic Research
Last Message: 5/24/2016
 |  Comments: 2
Russian Hackers Made $2.5B Over The Last 12 Months
Last Message: 5/24/2016
 |  Comments: 13
Closing the Gender Gap in Cybersecurity: 3 Critical Steps
Last Message: 5/23/2016
 |  Comments: 9
Vietnam Bank Target Of Failed Cyberattack In December
Last Message: 5/23/2016
 |  Comments: 1
Survey: Customers Lose Trust In Brands After A Data Breach
Last Message: 5/23/2016
 |  Comments: 3
TeslaCrypt Ransomware Group Pulls Plug, Releases Decrypt Key
Last Message: 5/23/2016
 |  Comments: 2
What Europe Tells Us About The Future Of Data Privacy
Last Message: 5/23/2016
 |  Comments: 1
Windows XP Zero-Day Vulnerability Popular
Last Message: 5/20/2016
 |  Comments: 4
Avoiding Legal Landmines in Data Breach Response
Last Message: 5/18/2016
 |  Comments: 4
Getting the Most Out of Your IT Security Budget
Last Message: 5/18/2016
 |  Comments: 48
Surviving Infosec: Keep Calm & Make Time For Yourself
Last Message: 5/18/2016
 |  Comments: 1
Phishing Fraud BECkons: Will You Fall Victim?
Last Message: 5/17/2016
 |  Comments: 2
Heres How To Protect Against A Ransomware Attack
Last Message: 5/16/2016
 |  Comments: 2
What's Next For Network Security
Last Message: 5/16/2016
 |  Comments: 2
Investigations Into Bangladesh Bank Heist Indicate Inside Job
Last Message: 5/13/2016
 |  Comments: 1
What Makes Next-Gen Endpoint Protection Unique?
Last Message: 5/13/2016
 |  Comments: 2
Cartoon: It's A People Problem
Last Message: 5/13/2016
 |  Comments: 2
Healthcare Suffers Estimated $6.2 Billion In Data Breaches
Last Message: 5/12/2016
 |  Comments: 3
PCI DSS 3.2: Making the Move to MFA
Last Message: 5/12/2016
 |  Comments: 3
Security Innovation: Driven By Necessity, Fueled By Interaction
Last Message: 5/11/2016
 |  Comments: 1
What Not To Do In a Cyberattack
Last Message: 5/10/2016
 |  Comments: 10
Page 1 / 2   >   >>


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Compliance and Risk Management Officer, AvePoint, Inc,  8/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15601
PUBLISHED: 2018-08-21
apps/filemanager/handlers/upload/drop.php in Elefant CMS 2.0.3 performs a urldecode step too late in the "Cannot upload executable files" protection mechanism.
CVE-2018-15603
PUBLISHED: 2018-08-21
An issue was discovered in Victor CMS through 2018-05-10. There is XSS via the Author field of the "Leave a Comment" screen.
CVE-2018-15598
PUBLISHED: 2018-08-21
Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable.
CVE-2018-15599
PUBLISHED: 2018-08-21
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
CVE-2018-0501
PUBLISHED: 2018-08-21
The mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.