Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in May 2018
Page 1 / 2   >   >>
Thoma Bravo Acquires Majority Stake in LogRhythm
Last Message: 5/31/2018
 |  Comments: 1
Canadian Banks Hacked
Last Message: 5/31/2018
 |  Comments: 1
Mobile Malware Moves to Mine Monero (and Other Currencies)
Last Message: 5/31/2018
 |  Comments: 1
Privacy Group: Facebook, Google Policies Break GDPR Laws
Last Message: 5/31/2018
 |  Comments: 7
6 Critical SAP HANA Vulns Can't Be Fixed With Patches
Last Message: 5/31/2018
 |  Comments: 1
Android Malware Comes Baked into Some New Tablets, Phones
Last Message: 5/30/2018
 |  Comments: 7
Privacy Survey Says: Americans Don't Want to Sell Their Data
Last Message: 5/30/2018
 |  Comments: 6
Email Security Tools Try to Keep Up with Threats
Last Message: 5/29/2018
 |  Comments: 2
More Than Half of Users Reuse Passwords
Last Message: 5/29/2018
 |  Comments: 4
What Should Post-Quantum Cryptography Look Like?
Last Message: 5/24/2018
 |  Comments: 1
How & Why the Cybersecurity Landscape Is Changing
Last Message: 5/24/2018
 |  Comments: 1
Is Threat Intelligence Garbage?
Last Message: 5/24/2018
 |  Comments: 2
ZipperDown Vulnerability Could Hit 10% of iOS Apps
Last Message: 5/24/2018
 |  Comments: 1
Fraud Drops 76% for Merchants Using EMV, Says Visa
Last Message: 5/24/2018
 |  Comments: 1
US Government Cybersecurity at a Crossroads
Last Message: 5/24/2018
 |  Comments: 1
Doh!!! The 10 Most Overlooked Security Tasks
Last Message: 5/24/2018
 |  Comments: 3
Pet Tracker Flaws Expose Pets and Their Owners to Cybercrime
Last Message: 5/22/2018
 |  Comments: 1
A Data Protection Officer's Guide to GDPR 'Privacy by Design'
Last Message: 5/22/2018
 |  Comments: 1
'Roaming Mantis' Android Malware Evolves, Expands Targets
Last Message: 5/21/2018
 |  Comments: 1
Want Your Daughter to Succeed in Cyber? Call Her John
Last Message: 5/21/2018
 |  Comments: 7
Syrian Electronic Army Members Indicted for Conspiracy
Last Message: 5/21/2018
 |  Comments: 1
New Mexico Man Sentenced on DDoS, Gun Charges
Last Message: 5/21/2018
 |  Comments: 2
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Last Message: 5/20/2018
 |  Comments: 2
The Rising Dangers of Unsecured IoT Technology
Last Message: 5/18/2018
 |  Comments: 1
IT Pros Worried About IoT But Not Prepared to Secure It
Last Message: 5/17/2018
 |  Comments: 1
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Last Message: 5/16/2018
 |  Comments: 3
Newly Released Russian Facebook Ads Show Scale of Manipulation
Last Message: 5/15/2018
 |  Comments: 4
Ransomware, Mac Malware Dominate Q1 Threat Landscape
Last Message: 5/14/2018
 |  Comments: 6
20 Signs You Are Heading for a Retention Problem
Last Message: 5/14/2018
 |  Comments: 3
5 Signs Your Smartphone Has Been Hacked
Last Message: 5/14/2018
 |  Comments: 3
Phishing Attack Bypasses Two-Factor Authentication
Last Message: 5/12/2018
 |  Comments: 1
As Personal Encryption Rises, So Do Backdoor Concerns
Last Message: 5/10/2018
 |  Comments: 1
Publicly Disclosed Breaches Down Drastically in Q1 2018
Last Message: 5/9/2018
 |  Comments: 1
5 Ways to Better Use Data in Security
Last Message: 5/9/2018
 |  Comments: 3
What Meltdown and Spectre Mean for Mobile Device Security
Last Message: 5/4/2018
 |  Comments: 4
Diversity: It's About Inclusion
Last Message: 5/4/2018
 |  Comments: 5
Are You Protecting Your DevOps Software 'Factory'?
Last Message: 5/4/2018
 |  Comments: 2
'Don't Extort Us': Uber Clarifies its Bug Bounty Policy
Last Message: 5/4/2018
 |  Comments: 10
No Computing Device Too Small For Cryptojacking
Last Message: 5/4/2018
 |  Comments: 1
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4194
PUBLISHED: 2022-11-30
Use after free in Accessibility in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2022-4195
PUBLISHED: 2022-11-30
Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass Safe Browsing warnings via a malicious file. (Chromium security severity: Medium)
CVE-2022-4175
PUBLISHED: 2022-11-30
Use after free in Camera Capture in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2022-4176
PUBLISHED: 2022-11-30
Out of bounds write in Lacros Graphics in Google Chrome on Chrome OS and Lacros prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: High)
CVE-2022-4177
PUBLISHED: 2022-11-30
Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High)