Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in May 2020
Page 1 / 2   >   >>
"Hacking Higher Education"
Last Message: 5/31/2020
 |  Comments: 101
Cloud Security Architect Proves Hardest Infosec Role to Fill
Last Message: 5/30/2020
 |  Comments: 8
Abandoned Apps May Pose Security Risk to Mobile Devices
Last Message: 5/30/2020
 |  Comments: 5
3 Reasons Why your Remote Workforce Is Vulnerable
Last Message: 5/30/2020
 |  Comments: 5
Data Loss Spikes Under COVID-19 Lockdowns
Last Message: 5/30/2020
 |  Comments: 5
Battling Bots: How to Find Fake Twitter Followers
Last Message: 5/30/2020
 |  Comments: 34
Stay-at-Home Orders Coincide With Massive DNS Surge
Last Message: 5/29/2020
 |  Comments: 6
GDPR Enforcement Loosens Amid Pandemic
Last Message: 5/29/2020
 |  Comments: 3
Companies Pursue Zero Trust, but Implementers Are Hesitant
Last Message: 5/29/2020
 |  Comments: 1
Stay-at-Home Students Offered Lessons to Boost Cybersecurity
Last Message: 5/29/2020
 |  Comments: 1
4 Ways Thinking 'Childishly' Can Empower Security Professionals
Last Message: 5/29/2020
 |  Comments: 1
Benefits of a Cloud-Based, Automated Cyber Range
Last Message: 5/28/2020
 |  Comments: 1
Google Removes 500 Android Apps Following Spyware Scare
Last Message: 5/28/2020
 |  Comments: 3
A Lesson in Social Engineering
Last Message: 5/28/2020
 |  Comments: 1
Cybersecurity Buzz Phrase Bingo
Last Message: 5/27/2020
 |  Comments: 4
10 iOS Security Tips to Lock Down Your iPhone
Last Message: 5/27/2020
 |  Comments: 2
Dark Reading Edge Cybersecurity Crossword Puzzle, May 22th
Last Message: 5/27/2020
 |  Comments: 1
The Problem with Artificial Intelligence in Security
Last Message: 5/27/2020
 |  Comments: 2
Hackers Cash In On ATMs
Last Message: 5/26/2020
 |  Comments: 9
5 Tips for Fighting Credential Stuffing Attacks
Last Message: 5/26/2020
 |  Comments: 1
5 Things Ransomware Taught Me About Responding in a Crisis
Last Message: 5/26/2020
 |  Comments: 2
Ransomware Trains Its Sights on Cloud Providers
Last Message: 5/25/2020
 |  Comments: 15
Schneier on Hacking Society
Last Message: 5/25/2020
 |  Comments: 1
Online Employment Scams on the Rise, Says FBI
Last Message: 5/25/2020
 |  Comments: 1
As DevOps Accelerates, Security's Role Changes
Last Message: 5/25/2020
 |  Comments: 1
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Last Message: 5/25/2020
 |  Comments: 1
The Future Of ATM Hacking
Last Message: 5/24/2020
 |  Comments: 6
Researchers Find Baby Banking Trojan, Watch It Grow
Last Message: 5/24/2020
 |  Comments: 1
Android Security: 8 Signs Hackers Own Your Smartphone
Last Message: 5/20/2020
 |  Comments: 21
CastleCops Shuts Down
Last Message: 5/20/2020
 |  Comments: 1
Latest Security News & Commentary about COVID-19
Last Message: 5/20/2020
 |  Comments: 11
8 Supply Chain Security Requirements
Last Message: 5/18/2020
 |  Comments: 1
Facebook Fails to Staunch Coronavirus Misinformation
Last Message: 5/17/2020
 |  Comments: 3
Pandemic Could Accelerate Passwordless Authentication
Last Message: 5/17/2020
 |  Comments: 1
Name That Toon: The Lights Are On ...
Last Message: 5/16/2020
 |  Comments: 12
Companies Struggle for Effective Cybersecurity
Last Message: 5/15/2020
 |  Comments: 5
Microsoft Identity VP Shares How and Why to Ditch Passwords
Last Message: 5/14/2020
 |  Comments: 1
Cartoon: Phishing Intelligence
Last Message: 5/14/2020
 |  Comments: 4
Cybersecurity Home-School: The Robot Project
Last Message: 5/14/2020
 |  Comments: 1
Security Lessons We've Learned (So Far) from COVID-19
Last Message: 5/14/2020
 |  Comments: 1
Ed-Tech Company Chegg Suffers Third Breach Since 2018
Last Message: 5/13/2020
 |  Comments: 2
Healthcare Targeted By More Attacks But Less Sophistication
Last Message: 5/13/2020
 |  Comments: 2
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...