Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in June 2017
Page 1 / 2   >   >>
Defining Security: The Difference Between Safety & Privacy
Last Message: 6/30/2017
 |  Comments: 1
Data Visualization: Keeping an Eye on Security
Last Message: 6/30/2017
 |  Comments: 3
Unsanctioned Computer Support Costs Companies $88K per Year
Last Message: 6/30/2017
 |  Comments: 4
$71 Million Restitution Owed for Hacking, Fraud Scheme
Last Message: 6/29/2017
 |  Comments: 1
Researchers Find 'Vaccine' for Global Ransomware Attack
Last Message: 6/28/2017
 |  Comments: 1
Cloud Security Lessons from the RNC Leak
Last Message: 6/27/2017
 |  Comments: 1
RAT Vulnerabilities Turn Hackers into Victims
Last Message: 6/27/2017
 |  Comments: 1
$12B in Fraud Loss Came from Data Breach Victims in 2016
Last Message: 6/27/2017
 |  Comments: 1
Recovering from Bad Decisions in the Cloud
Last Message: 6/27/2017
 |  Comments: 1
Breach of Homeland Security Background Checks Raises Red Flags
Last Message: 6/27/2017
 |  Comments: 14
Cyber Security Needs Its Ralph Nader
Last Message: 6/26/2017
 |  Comments: 14
Data Breach Costs Drop Globally But Increase in US
Last Message: 6/26/2017
 |  Comments: 1
Why Identity Has Become A Top Concern For CSOs
Last Message: 6/25/2017
 |  Comments: 2
Most General Counsels Fret over Data Security
Last Message: 6/25/2017
 |  Comments: 1
Hyundai Blue Link Vulnerability Allows Remote Start of Cars
Last Message: 6/24/2017
 |  Comments: 2
Cybersecurity Fact vs. Fiction
Last Message: 6/24/2017
 |  Comments: 2
The Folly of Vulnerability & Patch Management for ICS Networks
Last Message: 6/23/2017
 |  Comments: 1
And Now A PREDATOR To Fight DNS Domain Abuse
Last Message: 6/21/2017
 |  Comments: 8
Cyber Insurance: Read the Fine Print!
Last Message: 6/20/2017
 |  Comments: 1
Yahoo CEO Punished for Data Breaches
Last Message: 6/20/2017
 |  Comments: 3
Security in the Cloud: Pitfalls and Potential of CASB Systems
Last Message: 6/16/2017
 |  Comments: 2
NSA Reportedly Confident North Korea Was Behind WannaCry
Last Message: 6/16/2017
 |  Comments: 2
By the Numbers: Parsing the Cybersecurity Challenge
Last Message: 6/16/2017
 |  Comments: 3
Sensitive DoD Data Discovered on Unprotected Server
Last Message: 6/16/2017
 |  Comments: 2
The Sorry State Of Cybersecurity Awareness Training
Last Message: 6/14/2017
 |  Comments: 8
Cybersecurity Faces 1.8 Million Worker Shortfall By 2022
Last Message: 6/14/2017
 |  Comments: 7
Businesses Spend 1,156 Hours Per Week on Endpoint Security
Last Message: 6/13/2017
 |  Comments: 1
New Malware-as-a-Service Offerings Target Mac OS X
Last Message: 6/13/2017
 |  Comments: 4
Why Compromised Identities Are ITs Fault
Last Message: 6/13/2017
 |  Comments: 2
Child Exploitation & Assassins For Hire On The Deep Web
Last Message: 6/12/2017
 |  Comments: 9
Majority of DDoS Attacks are Short, Low-Volume Bursts
Last Message: 6/12/2017
 |  Comments: 2
How End-User Devices Get Hacked: 8 Easy Ways
Last Message: 6/12/2017
 |  Comments: 1
FTC Issues Advice on Mobile Phone Data Security, Identity Theft
Last Message: 6/12/2017
 |  Comments: 1
Security Orchestration Fine-Tunes the Incident Response Process
Last Message: 6/12/2017
 |  Comments: 2
10 Security Certifications To Boost Your Career
Last Message: 6/12/2017
 |  Comments: 20
7 Hot Security Terms (and Buzzwords) to Know
Last Message: 6/12/2017
 |  Comments: 5
New Attack Method Delivers Malware Via Mouse Hover
Last Message: 6/10/2017
 |  Comments: 1
Solving IPTV's Security Problem
Last Message: 6/9/2017
 |  Comments: 1
From Reporter to Private Investigator to Security Engineer
Last Message: 6/9/2017
 |  Comments: 1
Police Bust $200 Million Data Theft Ring
Last Message: 6/9/2017
 |  Comments: 2
Your Information Isn't Being Hacked, It's Being Neglected
Last Message: 6/9/2017
 |  Comments: 1
Interpol Analyzes Global Response to WannaCry Attack
Last Message: 6/8/2017
 |  Comments: 1
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...