Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in September 2018
Page 1 / 2   >   >>
Microsoft Fixes Two Security Flaws in Outlook
Last Message: 9/29/2018
 |  Comments: 2
Inside Microsoft Azure Sphere
Last Message: 9/29/2018
 |  Comments: 1
Google to Let Users Disable Automatic Login to Chrome
Last Message: 9/28/2018
 |  Comments: 2
Managing Data the Way We Manage Money
Last Message: 9/28/2018
 |  Comments: 1
Open Source Software Poses a Real Security Threat
Last Message: 9/28/2018
 |  Comments: 2
VPNFilter Evolving to Be a More Dangerous Threat
Last Message: 9/28/2018
 |  Comments: 6
SEC Slams Firm with $1M Fine for Weak Security Policies
Last Message: 9/28/2018
 |  Comments: 7
Payment Security Compliance Takes a Turn for the Worse
Last Message: 9/27/2018
 |  Comments: 6
The 7 Habits of Highly Effective Security Teams
Last Message: 9/26/2018
 |  Comments: 1
The Human Factor in Social Media Risk
Last Message: 9/26/2018
 |  Comments: 2
US Approves Cyber Weapons Against Foreign Enemies
Last Message: 9/26/2018
 |  Comments: 2
Cryptomining Malware Continues Rapid Growth: Report
Last Message: 9/26/2018
 |  Comments: 1
Adobe's Move to Kill Flash Is Good for Security
Last Message: 9/26/2018
 |  Comments: 2
FlawedAmmyy RAT Campaign Puts New Spin on Old Threat
Last Message: 9/25/2018
 |  Comments: 2
'Scan4Yyou' Operator Gets 14-Year Sentence
Last Message: 9/25/2018
 |  Comments: 1
Lazarus Group Builds its First MacOS Malware
Last Message: 9/25/2018
 |  Comments: 2
Hacking Back: Simply a Bad Idea
Last Message: 9/24/2018
 |  Comments: 1
Overhauling the 3 Pillars of Security Operations
Last Message: 9/23/2018
 |  Comments: 2
6 Security Training Hacks to Increase Cyber IQ Org-Wide
Last Message: 9/22/2018
 |  Comments: 1
Internet-Connected CCTV Cameras Vulnerable to 'Peekaboo' Hack
Last Message: 9/21/2018
 |  Comments: 1
Microsoft's Patch Tuesday Fixes Two CVEs Under Active Attack
Last Message: 9/21/2018
 |  Comments: 1
Mirai Hackers' Sentence Includes No Jail Time
Last Message: 9/20/2018
 |  Comments: 2
Instagram Debuts New Security Tools
Last Message: 9/19/2018
 |  Comments: 1
10 Major Cloud Storage Security Slip-Ups (So Far) this Year
Last Message: 9/18/2018
 |  Comments: 2
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Last Message: 9/18/2018
 |  Comments: 3
Yahoo Class-Action Suits Set for Settlement
Last Message: 9/18/2018
 |  Comments: 2
RDP Ports Prove Hot Commodities on the Dark Web
Last Message: 9/18/2018
 |  Comments: 1
Shadow IT: Every Company's 3 Hidden Security Risks
Last Message: 9/17/2018
 |  Comments: 2
4 Practical Measures to Improve Election Security Now
Last Message: 9/17/2018
 |  Comments: 1
Cracking 2FA: How It's Done and How to Stay Safe
Last Message: 9/17/2018
 |  Comments: 3
Apple Releases Wave of Security Updates
Last Message: 9/17/2018
 |  Comments: 1
Guccifer to Be Extradited to US for Prison Sentence
Last Message: 9/16/2018
 |  Comments: 1
The Best Way To Secure US Elections? Paper Ballots
Last Message: 9/13/2018
 |  Comments: 4
Leveraging the Power of your End-Users Human Cognition
Last Message: 9/13/2018
 |  Comments: 1
'EFAIL' Email Encryption Flaw Research Stirs Debate
Last Message: 9/13/2018
 |  Comments: 1
Dark Reading News Desk Live at Black Hat USA 2018
Last Message: 9/12/2018
 |  Comments: 1
7 Tips to Fight Gmail Phishing Attacks
Last Message: 9/12/2018
 |  Comments: 1
The Weakest Security Links in the (Block)Chain
Last Message: 9/11/2018
 |  Comments: 1
Why Automation Will Free Security Pros to Do What They Do Best
Last Message: 9/10/2018
 |  Comments: 1
Adblock Plus Available For Safari
Last Message: 9/10/2018
 |  Comments: 1
The Real Reasons Why Users Stink At Passwords
Last Message: 9/7/2018
 |  Comments: 15
It's Time to Take GitHub Threats Seriously
Last Message: 9/7/2018
 |  Comments: 1
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...