Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in December 2014
Page 1 / 2   >   >>
Tech Insight: Hacking The Nest Thermostat
Last Message: 12/31/2014
 |  Comments: 6
Why Digital Forensics In Incident Response Matter More Now
Last Message: 12/29/2014
 |  Comments: 6
The Coolest Hacks Of 2014
Last Message: 12/29/2014
 |  Comments: 9
Obama: U.S. Will Respond 'Proportionately' to Sony Cyber Attack
Last Message: 12/28/2014
 |  Comments: 20
North Korea's Internet Restored
Last Message: 12/27/2014
 |  Comments: 7
Time to Rethink Patching Strategies
Last Message: 12/26/2014
 |  Comments: 14
Security News No One Saw Coming In 2014
Last Message: 12/24/2014
 |  Comments: 12
CISO Holiday Bookshelf
Last Message: 12/22/2014
 |  Comments: 1
5 Pitfalls to Avoid When Running Your SOC
Last Message: 12/22/2014
 |  Comments: 6
New OpenSSL Flaw Exposes SSL To Man-In-The-Middle Attack
Last Message: 12/22/2014
 |  Comments: 10
The Internet's Winter Of Discontent
Last Message: 12/22/2014
 |  Comments: 1
'Grinch' Bug May Affect Most Linux Systems
Last Message: 12/22/2014
 |  Comments: 3
Sony Hackers Knew Details Of Sony's Entire IT Infrastructure
Last Message: 12/22/2014
 |  Comments: 32
The New Target for State-Sponsored Cyber Attacks: Applications
Last Message: 12/19/2014
 |  Comments: 1
How to Become a CISO
Last Message: 12/17/2014
 |  Comments: 87
Price Tag Rises For Stolen Identities Sold In The Underground
Last Message: 12/17/2014
 |  Comments: 4
Targeted Attacks: A Defender's Playbook
Last Message: 12/16/2014
 |  Comments: 3
FBI Calls For Law Facilitating Security Information Sharing
Last Message: 12/15/2014
 |  Comments: 2
Attackers Turn Focus to PoS Vendors
Last Message: 12/14/2014
 |  Comments: 1
DARPA Investigates Storytelling As Security Science
Last Message: 12/14/2014
 |  Comments: 1
'DeathRing' Malware Found Pre-Installed On Smartphones
Last Message: 12/12/2014
 |  Comments: 4
Ex-NSA Agents' Security Startup Lands $8 Million In Funding
Last Message: 12/11/2014
 |  Comments: 4
"Can The NSA Really Track Turned-Off Cellphones?"
Last Message: 12/11/2014
 |  Comments: 10
Breach Security 101
Last Message: 12/10/2014
 |  Comments: 1
'Inception' Cyber Espionage Campaign Targets PCs, Smartphones
Last Message: 12/10/2014
 |  Comments: 1
Employees Still Get More Access Than They Need
Last Message: 12/10/2014
 |  Comments: 1
2014: The Year of Shaken Trust
Last Message: 12/9/2014
 |  Comments: 1
Internet Of Things Devices Are Doomed
Last Message: 12/6/2014
 |  Comments: 10
Why Regin Malware Changes Threatscape Economics
Last Message: 12/5/2014
 |  Comments: 3
Q&A: Internet Encryption As The New Normal
Last Message: 12/4/2014
 |  Comments: 6
New TLS/SSL Version Ready In 2015
Last Message: 12/4/2014
 |  Comments: 2
The Case for Compelling Executive Dashboards
Last Message: 12/4/2014
 |  Comments: 4
The Real Cost of Cyber Incidents, According To Insurers
Last Message: 12/4/2014
 |  Comments: 3
Leveraging The Kill Chain For Awesome
Last Message: 12/4/2014
 |  Comments: 1
How I Became a CISO: Jonathan Trull, Qualys
Last Message: 12/3/2014
 |  Comments: 1
How Startups Can Jumpstart Security Innovation
Last Message: 12/3/2014
 |  Comments: 1
Why We Need Better Cyber Security: A Graphical Snapshot
Last Message: 12/3/2014
 |  Comments: 13
Cybercrooks Expand Sights To Market Manipulation
Last Message: 12/2/2014
 |  Comments: 2
Marrying Monitoring With IAM
Last Message: 12/2/2014
 |  Comments: 2
Youre Doing BYOD Wrong: These Numbers Prove It
Last Message: 12/2/2014
 |  Comments: 4
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file