Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Latest Message Boards
Page 1 / 2   >   >>
7 Reasons Consumers Dont Take Action on Cybersecurity
Last Message: 1/31/2023
 |  Comments: 11
American Hacker Arrested For 2014 JP Morgan Chase Breach
Last Message: 1/30/2023
 |  Comments: 9
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
Last Message: 1/26/2023
 |  Comments: 12
Phishing: What Once Was Old Is New Again
Last Message: 12/27/2022
 |  Comments: 16
"Hacking Higher Education"
Last Message: 11/25/2022
 |  Comments: 17
Pen Testing A Smart City
Last Message: 10/21/2022
 |  Comments: 2
It's in the Game (but It Shouldn't Be)
Last Message: 9/14/2022
 |  Comments: 2
8 Security Tools to be Unveiled at Black Hat USA
Last Message: 9/7/2022
 |  Comments: 2
A Crisis of Confidence Among Security Pros
Last Message: 8/17/2022
 |  Comments: 12
XDR: A Game-Changer in Enterprise Threat Detection
Last Message: 8/12/2022
 |  Comments: 1
Hackers Cash In On ATMs
Last Message: 7/16/2022
 |  Comments: 2
10 Cybersecurity Twitter Profiles To Watch
Last Message: 6/28/2022
 |  Comments: 3
Dark Reading Radio: Firewall Smackdown
Last Message: 5/18/2022
 |  Comments: 1
The Cyber Skills Shortage
Last Message: 11/15/2021
 |  Comments: 50
7 Tips for Choosing Security Metrics That Matter
Last Message: 11/12/2021
 |  Comments: 1
Snowden Sued by US Government Over His New Book
Last Message: 10/31/2021
 |  Comments: 1
3 Things Every CISO Wishes You Understood
Last Message: 10/30/2021
 |  Comments: 1
Mobile Ransomware Hits Browsers with Old-School Techniques
Last Message: 10/20/2021
 |  Comments: 1
Hacking Group LulzSec Denies Arrest Report
Last Message: 9/30/2021
 |  Comments: 5
Name That Toon: Return to the New Normal
Last Message: 9/1/2021
 |  Comments: 20
NordVPN Lists 5 Measures to Supercharge Its Security
Last Message: 8/31/2021
 |  Comments: 1
Russian Hackers Behind DNC Breach Wage Post-US Election Attacks
Last Message: 8/25/2021
 |  Comments: 7
The Three Dimensions of the Threat Intelligence Scale Problem
Last Message: 8/19/2021
 |  Comments: 7
Researchers Call for 'CVE' Approach for Cloud Vulnerabilities
Last Message: 8/11/2021
 |  Comments: 1
White House Cybersecurity Strategy at a Crossroads
Last Message: 8/9/2021
 |  Comments: 7
Latest Security News & Commentary about COVID-19
Last Message: 8/9/2021
 |  Comments: 19
Yahoo Agrees to $80 Million Settlement with Investors
Last Message: 8/5/2021
 |  Comments: 1
7 Hot Cyber Threat Trends to Expect at Black Hat
Last Message: 7/29/2021
 |  Comments: 1
Name That Edge Toon: Security Grill
Last Message: 7/29/2021
 |  Comments: 1
US-CERT Warns That HTTPS Inspection Tools Weaken TLS
Last Message: 7/19/2021
 |  Comments: 45
SonicWall: 'Imminent' Ransomware Attack Targets Older Products
Last Message: 7/15/2021
 |  Comments: 1
Kaseya Releases Security Patch As Companies Continue to Recover
Last Message: 7/15/2021
 |  Comments: 3
Why Are There Never Enough Logs During an Incident Response?
Last Message: 7/10/2021
 |  Comments: 1
5 Mistakes That Impact a Security Team's Success
Last Message: 7/8/2021
 |  Comments: 1
Watch for Cybersecurity Games at the Tokyo Olympics
Last Message: 7/6/2021
 |  Comments: 1
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.