Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in January 2021
Digital Identity Is the New Security Control Plane
Last Message: 1/29/2021
 |  Comments: 1
The Insecure State of Microsoft Teams Security
Last Message: 1/29/2021
 |  Comments: 1
Building Your Personal Privacy Risk Tolerance Profile
Last Message: 1/28/2021
 |  Comments: 1
Google to Delete 'Secure' Label from HTTPS Sites
Last Message: 1/28/2021
 |  Comments: 1
Learn SAML: The Language You Don't Know You're Already Speaking
Last Message: 1/26/2021
 |  Comments: 1
PoisonTap USB Device Can Hack A Locked PC In A Minute
Last Message: 1/26/2021
 |  Comments: 1
5 Key Takeaways From the SolarWinds Breach
Last Message: 1/25/2021
 |  Comments: 1
Name That Toon: Before I Go ...
Last Message: 1/25/2021
 |  Comments: 11
Attackers Leave Stolen Credentials Searchable on Google
Last Message: 1/25/2021
 |  Comments: 1
And Now A PREDATOR To Fight DNS Domain Abuse
Last Message: 1/23/2021
 |  Comments: 7
More SolarWinds Attack Details Emerge
Last Message: 1/23/2021
 |  Comments: 1
Preparing For The Future Of Online Threats
Last Message: 1/21/2021
 |  Comments: 14
10 Standout Security M&A Deals from Q1 2020
Last Message: 1/20/2021
 |  Comments: 2
NSA Appoints Rob Joyce as Cyber Director
Last Message: 1/19/2021
 |  Comments: 1
Understanding TCP/IP Stack Vulnerabilities in the IoT
Last Message: 1/19/2021
 |  Comments: 1
Q&A: How Systemic Racism Weakens Cybersecurity
Last Message: 1/19/2021
 |  Comments: 6
BYOD: 'We Have Met the Enemy & He Is Us'
Last Message: 1/19/2021
 |  Comments: 6
6 Personality Profiles of White-Hat Hackers
Last Message: 1/18/2021
 |  Comments: 1
Deep Instinct Touts Predictive Aspects of Deep Learning
Last Message: 1/17/2021
 |  Comments: 3
How Can I Help My Users Spot Disinformation?
Last Message: 1/15/2021
 |  Comments: 1
Do Standards Exist That Certify Secure IoT Systems?
Last Message: 1/14/2021
 |  Comments: 1
Vulnerability Management Has a Data Problem
Last Message: 1/14/2021
 |  Comments: 1
When It Comes To Security Tools, More Isn't More
Last Message: 1/12/2021
 |  Comments: 1
Mobile Device Security Isn't All About Devices
Last Message: 1/11/2021
 |  Comments: 3
New Proposed DNS Security Features Released
Last Message: 1/10/2021
 |  Comments: 3
Even Small Nations Have Jumped into the Cyber Espionage Game
Last Message: 1/8/2021
 |  Comments: 1
Google Removes 500 Android Apps Following Spyware Scare
Last Message: 1/7/2021
 |  Comments: 2
The Yellow Brick Road to Risk Management
Last Message: 1/6/2021
 |  Comments: 2
Massive Bot-Enabled Ad Fraud Campaign Targeted Connected TVs
Last Message: 1/5/2021
 |  Comments: 1
T-Mobile Hacked -- Again
Last Message: 1/5/2021
 |  Comments: 1
SASE 101: Why All the Buzz?
Last Message: 1/4/2021
 |  Comments: 1
Name That Toon: Winter Forecast
Last Message: 1/4/2021
 |  Comments: 16


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-43705
PUBLISHED: 2022-11-27
In Botan before 2.19.3, it is possible to forge OCSP responses due to a certificate verification error. This issue was introduced in Botan 1.11.34 (November 2016).
CVE-2022-45934
PUBLISHED: 2022-11-27
An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.
CVE-2022-45931
PUBLISHED: 2022-11-27
A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used.
CVE-2022-45932
PUBLISHED: 2022-11-27
A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole function is affected when the API interface /auth/v1/roles/ is used.
CVE-2022-45933
PUBLISHED: 2022-11-27
KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side proj...