Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in July 2020
Page 1 / 2   >   >>
Block/Allow: The Changing Face of Hacker Linguistics
Last Message: 7/31/2020
 |  Comments: 7
70,000+ WordPress Sites Affected by Critical Plug-in Flaw
Last Message: 7/30/2020
 |  Comments: 1
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Last Message: 7/30/2020
 |  Comments: 2
Average Cost of a Data Breach: $3.86 Million
Last Message: 7/30/2020
 |  Comments: 1
Security Flaws Discovered in OKCupid Dating Service
Last Message: 7/30/2020
 |  Comments: 1
Autonomous IT: Less Reacting, More Securing
Last Message: 7/29/2020
 |  Comments: 1
Lazarus Group Shifts Gears with Custom Ransomware
Last Message: 7/29/2020
 |  Comments: 2
7.5M Banking Customers Affected in Dave Security Breach
Last Message: 7/29/2020
 |  Comments: 1
Avon Server Leaks User Info and Administrative Data
Last Message: 7/29/2020
 |  Comments: 2
ShinyHunters Offers Stolen Data on Dark Web
Last Message: 7/28/2020
 |  Comments: 1
Most Businesses to Add More Cloud Security Tools
Last Message: 7/28/2020
 |  Comments: 1
Cybersecurity's Lament: There Are No Cooks in Space
Last Message: 7/25/2020
 |  Comments: 1
What Do You Mean My Security Tools Dont Work on APIs?!!
Last Message: 7/24/2020
 |  Comments: 10
Deepfakes & James Bond Research Project: Cool but Dangerous
Last Message: 7/23/2020
 |  Comments: 1
Microsoft 365 Updated with New Security, Risk, Compliance Tools
Last Message: 7/23/2020
 |  Comments: 3
BIG-IP Vulnerabilities Could be Big Trouble for Customers
Last Message: 7/22/2020
 |  Comments: 1
The State of Hacktivism in 2020
Last Message: 7/22/2020
 |  Comments: 1
Open Source v. Closed Source: What's More Secure?
Last Message: 7/22/2020
 |  Comments: 6
Its Time to Treat Your Cyber Strategy Like a Business
Last Message: 7/22/2020
 |  Comments: 7
8 Signs of a Smartphone Hack
Last Message: 7/21/2020
 |  Comments: 2
Election Security: Recovering from 2016, Looking Toward 2020
Last Message: 7/21/2020
 |  Comments: 4
SIGRed: What You Should Know About the Windows DNS Server Bug
Last Message: 7/21/2020
 |  Comments: 1
'Patch ASAP': Cisco Issues Updates for Routers, VPN Firewall
Last Message: 7/20/2020
 |  Comments: 1
Keys for a Safe Return to the Post-Quarantine Office
Last Message: 7/20/2020
 |  Comments: 1
What Organizations Need to Know About IoT Supply Chain Risk
Last Message: 7/20/2020
 |  Comments: 1
What Security Leaders Can Learn from Marketing
Last Message: 7/20/2020
 |  Comments: 1
Emotet Lives!
Last Message: 7/19/2020
 |  Comments: 1
USB Drives Remain Critical Cyberthreat
Last Message: 7/19/2020
 |  Comments: 8
How to Secure Machine Learning
Last Message: 7/17/2020
 |  Comments: 1
Vulns in Open Source EHR Puts Patient Health Data at Risk
Last Message: 7/16/2020
 |  Comments: 1
Good Cyber Hygiene in a Post-Pandemic World Starts with Us
Last Message: 7/16/2020
 |  Comments: 7
Time to Get Smarter About Threat Intel
Last Message: 7/15/2020
 |  Comments: 3
Analytics and Data Prove Effective Security Hybrid
Last Message: 7/15/2020
 |  Comments: 3
Name That Toon: Tough Times, Tough Measures
Last Message: 7/14/2020
 |  Comments: 5
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4194
PUBLISHED: 2022-11-30
Use after free in Accessibility in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2022-4195
PUBLISHED: 2022-11-30
Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass Safe Browsing warnings via a malicious file. (Chromium security severity: Medium)
CVE-2022-4175
PUBLISHED: 2022-11-30
Use after free in Camera Capture in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2022-4176
PUBLISHED: 2022-11-30
Out of bounds write in Lacros Graphics in Google Chrome on Chrome OS and Lacros prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: High)
CVE-2022-4177
PUBLISHED: 2022-11-30
Use after free in Extensions in Google Chrome prior to 108.0.5359.71 allowed an attacker who convinced a user to install an extension to potentially exploit heap corruption via a crafted Chrome Extension and UI interaction. (Chromium security severity: High)