Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in March 2014
Outlook Users Face Zero-Day Attack
Last Message: 3/31/2014
 |  Comments: 7
Why FIDO Alliance Standards Will Kill Passwords
Last Message: 3/31/2014
 |  Comments: 9
Experts Question Security Payoff Of Sending Apps To The Cloud
Last Message: 3/31/2014
 |  Comments: 4
Safe Harbor, Lavabit & The Future Of Cloud Security
Last Message: 3/31/2014
 |  Comments: 1
Android Apps Hide Crypto-Currency Mining Malware
Last Message: 3/30/2014
 |  Comments: 1
Mt. Gox Chief Stole 100,000 Bitcoins, Hackers Claim
Last Message: 3/30/2014
 |  Comments: 6
Attacks Rise On Network 'Blind' Spot
Last Message: 3/28/2014
 |  Comments: 4
Securing Software Requires Design, Testing, And Improvement
Last Message: 3/28/2014
 |  Comments: 5
Snowden: I'd Do It Again
Last Message: 3/27/2014
 |  Comments: 10
Will Target Face FTC Probe?
Last Message: 3/27/2014
 |  Comments: 9
MACH37 Funds Six New Security Startups
Last Message: 3/27/2014
 |  Comments: 1
Facebook Builds Its Own Threat Modeling System
Last Message: 3/27/2014
 |  Comments: 4
March Madness: Online Privacy Edition
Last Message: 3/27/2014
 |  Comments: 1
Don't Put Too Much Faith in Cyberinsurance
Last Message: 3/26/2014
 |  Comments: 1
Luck O' The Irish: Caption Contest Winners Announced
Last Message: 3/24/2014
 |  Comments: 4
Symantec Fires CEO In Surprise Move
Last Message: 3/24/2014
 |  Comments: 10
Many Businesses Fail To Disclose Data Breaches
Last Message: 3/22/2014
 |  Comments: 2
Attackers Hit Clearinghouse Selling Stolen Target Data
Last Message: 3/21/2014
 |  Comments: 4
Name That Cartoon: Luck O' The Irish
Last Message: 3/20/2014
 |  Comments: 101
Voice, Proximity Key To Cutting
E-Payment Fraud

Last Message: 3/18/2014
 |  Comments: 2
Experian ID Theft Exposed 200M Consumer Records
Last Message: 3/18/2014
 |  Comments: 9
DDoS Attacks Hit NATO, Ukrainian Media Outlets
Last Message: 3/18/2014
 |  Comments: 3
7 Behaviors That Could Indicate A Security Breach
Last Message: 3/17/2014
 |  Comments: 1
DDoS Attack Hits 400 Gbit/s, Breaks Record
Last Message: 3/15/2014
 |  Comments: 6
Top 3 Tools For Busting Through Firewalls
Last Message: 3/14/2014
 |  Comments: 1
Your Cloud Was Breached. Now What?
Last Message: 3/14/2014
 |  Comments: 5
IT Generations: Communicating Across The Great Divide
Last Message: 3/14/2014
 |  Comments: 6
The Case For Browser-Based Access Controls
Last Message: 3/14/2014
 |  Comments: 2
Bitcoin, Meet Darwin: Crypto Currency's Future
Last Message: 3/13/2014
 |  Comments: 9
Can We Control Our Digital Identities?
Last Message: 3/12/2014
 |  Comments: 4
Retail Industry May Pool Intel To Stop Breaches
Last Message: 3/12/2014
 |  Comments: 2
Data Security: 4 Questions For Road Warriors
Last Message: 3/12/2014
 |  Comments: 25
Target Breach: Phishing Attack Implicated
Last Message: 3/11/2014
 |  Comments: 12
Target CIO's Resignation: 7 Questions
Last Message: 3/10/2014
 |  Comments: 10
Target Seeks New CIO
Last Message: 3/9/2014
 |  Comments: 11
Name That Toon, Win a Prize
Last Message: 3/7/2014
 |  Comments: 99
Data Breach: Persistence Gives Hackers the Upper Hand
Last Message: 3/7/2014
 |  Comments: 2
Cryptocat Wins Apple Approval
Last Message: 3/6/2014
 |  Comments: 1
Malware-Lobbing Hackers Seize 300,000 Routers
Last Message: 3/5/2014
 |  Comments: 1
Mt. Gox Bitcoin Meltdown: What Went Wrong
Last Message: 3/5/2014
 |  Comments: 3
DDoS Attack! Is Regulation The Answer?
Last Message: 3/3/2014
 |  Comments: 9
"Hackers Hold Australian Medical Records Ransom"
Last Message: 3/2/2014
 |  Comments: 6
Yahoo Japan Data Breach: 22M Accounts Exposed
Last Message: 3/1/2014
 |  Comments: 1


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4278
PUBLISHED: 2022-12-03
A vulnerability was found in SourceCodester Book Store Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /hrm/employeeadd.php. The manipulation of the argument empid leads to sql injection. The attack may be initiated remotely. The exploit h...
CVE-2022-4279
PUBLISHED: 2022-12-03
A vulnerability classified as problematic has been found in SourceCodester Human Resource Management System 1.0. Affected is an unknown function of the file /hrm/employeeview.php. The manipulation of the argument search leads to cross site scripting. It is possible to launch the attack remotely. The...
CVE-2022-4280
PUBLISHED: 2022-12-03
A vulnerability, which was classified as problematic, has been found in Dot Tech Smart Campus System. Affected by this issue is some unknown functionality of the file /services/Card/findUser. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been ...
CVE-2022-4277
PUBLISHED: 2022-12-03
A vulnerability was found in Shaoxing Background Management System. It has been declared as critical. This vulnerability affects unknown code of the file /Default/Bd. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to t...
CVE-2022-4275
PUBLISHED: 2022-12-03
A vulnerability has been found in House Rental System and classified as critical. Affected by this vulnerability is an unknown functionality of the file search-property.php of the component POST Request Handler. The manipulation of the argument search_property leads to sql injection. The attack can ...