Dark Reading Article Boards

Message Boards posted in August 2016
Page 1 / 2   >   >>
Report: Hackers Breach Two State Election Databases, FBI Warns
Last Message: 8/31/2016
 |  Comments: 1
US Think Tanks Involved In Russia Research Allegedly Hacked
Last Message: 8/31/2016
 |  Comments: 2
Malware Found In Iran Petro Plants
Last Message: 8/31/2016
 |  Comments: 2
2016 DDoS Attack Trends By The Numbers
Last Message: 8/31/2016
 |  Comments: 3
How Diversity Can Bridge The Talent Gap
Last Message: 8/31/2016
 |  Comments: 19
The Hidden Dangers Of 'Bring Your Own Body'
Last Message: 8/31/2016
 |  Comments: 7
Siris Lockscreen Bypass A Growing Privacy Issue For iOS Users
Last Message: 8/31/2016
 |  Comments: 11
Russian Cyberspies' Leaked Hacks Could Herald New Normal
Last Message: 8/30/2016
 |  Comments: 3
How To Use Threat Intelligence Intelligently
Last Message: 8/30/2016
 |  Comments: 1
New SMB Relay Attack Steals User Credentials Over Internet
Last Message: 8/28/2016
 |  Comments: 1
5 Tips for Protecting Firmware From Attacks
Last Message: 8/27/2016
 |  Comments: 2
CrowdStrike Integrates Scanning Engine With VirusTotal
Last Message: 8/26/2016
 |  Comments: 1
8 Surprising Statistics About Insider Threats
Last Message: 8/26/2016
 |  Comments: 1
Apple Releases Patch For 'Trident,' A Trio Of iOS 0-Days
Last Message: 8/25/2016
 |  Comments: 1
Anatomy Of A Social Media Attack
Last Message: 8/25/2016
 |  Comments: 5
When Securing Your Applications, Seeing Is Believing
Last Message: 8/25/2016
 |  Comments: 1
Free 'CANSPY' Car-Hacking Tool On Tap
Last Message: 8/24/2016
 |  Comments: 14
Hacktivists Take Aim At Olympics Broadcast Service
Last Message: 8/23/2016
 |  Comments: 1
Three Arrested For Cell Phone Hacking Scam
Last Message: 8/23/2016
 |  Comments: 1
Security Staff Shortages Incur Higher Breach Recovery Costs
Last Message: 8/19/2016
 |  Comments: 1
Employee Arrested For Breach At Software Firm Sage
Last Message: 8/19/2016
 |  Comments: 1
Data Protection From The Inside Out
Last Message: 8/17/2016
 |  Comments: 1
What Keeps IT Security Professionals Awake at Night
Last Message: 8/17/2016
 |  Comments: 32
15 US Cities Where Cybersecurity Professionals Earn Big Bucks
Last Message: 8/17/2016
 |  Comments: 1
Here's The Business Side Of Thwarting A Cyberattack
Last Message: 8/15/2016
 |  Comments: 1
Global Businesses Ask China To Revise Draft Cyber Rules
Last Message: 8/14/2016
 |  Comments: 1
Security Portfolios: A Different Approach To Leadership
Last Message: 8/13/2016
 |  Comments: 1
Government, Hackers Learn To Make Nice
Last Message: 8/13/2016
 |  Comments: 4
Organizations Still Give Employees More Access Than They Need
Last Message: 8/12/2016
 |  Comments: 1
Trump Winning Spam Race By Huge Margin
Last Message: 8/12/2016
 |  Comments: 3
5 Email Security Tips to Combat Macro-Enabled Ransomware
Last Message: 8/11/2016
 |  Comments: 3
Spearphishing: Its Curiosity That Makes Them Click
Last Message: 8/10/2016
 |  Comments: 2
Kaspersky Lab Kicks Off Its First Bug Bounty Program
Last Message: 8/10/2016
 |  Comments: 2
Symantec Discovers Strider, A New CyberEspionage Group
Last Message: 8/9/2016
 |  Comments: 1
Best Of Black Hat Innovation Awards: And The Winners Are
Last Message: 8/8/2016
 |  Comments: 1
Medical Device Security Gets Intensive Care
Last Message: 8/8/2016
 |  Comments: 9
New HIPAA Guidance Tackles Ransomware Epidemic In Healthcare
Last Message: 8/8/2016
 |  Comments: 1
Apple Finally Launches Bug Bounty Program
Last Message: 8/6/2016
 |  Comments: 1
Page 1 / 2   >   >>


How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
CVE-2018-18908
PUBLISHED: 2019-01-20
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requ...
CVE-2019-6496
PUBLISHED: 2019-01-20
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of...
CVE-2019-3773
PUBLISHED: 2019-01-18
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
CVE-2019-3774
PUBLISHED: 2019-01-18
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.