Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in May 2014
Page 1 / 2   >   >>
SNMP DDoS Attacks Spike
Last Message: 5/31/2014
 |  Comments: 4
Cartoon: What Your Toaster Now Needs
Last Message: 5/30/2014
 |  Comments: 2
Indicting Chinese Military Officers Is A Huge Mistake
Last Message: 5/30/2014
 |  Comments: 2
Cyber Security Skills
Last Message: 5/30/2014
 |  Comments: 1
7 Facts: eBay Fumbles Password Reset Warning
Last Message: 5/30/2014
 |  Comments: 5
eBay Breach: Is Your Identity Up For Auction?
Last Message: 5/29/2014
 |  Comments: 10
Privileged Use Also a State of Mind, Report Finds
Last Message: 5/28/2014
 |  Comments: 3
No More Jail Time: LulzSec's Sabu Sentenced to Time Served
Last Message: 5/28/2014
 |  Comments: 8
Women In Security: We've Still Got A Long Way To Go, Baby
Last Message: 5/28/2014
 |  Comments: 15
The Real Reason You Can't Fill Vacant Security Jobs
Last Message: 5/28/2014
 |  Comments: 85
Apple Users Fend Off Ransom Attacks Against iPhones & Macs
Last Message: 5/28/2014
 |  Comments: 2
Target, Neiman Marcus Malware Creators Identified
Last Message: 5/28/2014
 |  Comments: 8
DevOps Role In Application Security
Last Message: 5/27/2014
 |  Comments: 1
State of IT Security
Last Message: 5/27/2014
 |  Comments: 2
New Vulnerability In IE8 Remains Unpatched
Last Message: 5/26/2014
 |  Comments: 5
Zeus 'Gameover' Trojan Expands Global Reach
Last Message: 5/25/2014
 |  Comments: 1
Tech Insight: Free Tools For Offensive Security
Last Message: 5/25/2014
 |  Comments: 6
"Dropbox Admits Hack, Adds More Security Features"
Last Message: 5/24/2014
 |  Comments: 4
The Only 2 Things Every Developer Needs To Know About Injection
Last Message: 5/23/2014
 |  Comments: 3
Dark Reading To Launch Weekly Internet Radio Show
Last Message: 5/22/2014
 |  Comments: 2
eBay Database Hacked With Stolen Employee Credentials
Last Message: 5/22/2014
 |  Comments: 6
On The Trail of An Iranian Hacking Operation
Last Message: 5/22/2014
 |  Comments: 2
LifeLock Pulls Apps Over PCI Compliance Failure
Last Message: 5/22/2014
 |  Comments: 1
Sloppy Software Dev Exposes Google Hacker Holes
Last Message: 5/22/2014
 |  Comments: 1
After Heartbleed, Tech Giants Fund Open Source Security
Last Message: 5/22/2014
 |  Comments: 9
The Snowden Effect: Who Controls My Data?
Last Message: 5/22/2014
 |  Comments: 9
Black Hat USA 2014: Focus on Mobile
Last Message: 5/21/2014
 |  Comments: 1
Outlook.com Android App Leaves Email Messages Exposed
Last Message: 5/21/2014
 |  Comments: 5
Strong Passwords
Last Message: 5/21/2014
 |  Comments: 6
How To Talk About InfoSec To Your Board Of Directors
Last Message: 5/21/2014
 |  Comments: 4
Beware Cognitive Bias
Last Message: 5/21/2014
 |  Comments: 9
Microsoft: Deception Dominates Windows Attacks
Last Message: 5/21/2014
 |  Comments: 5
Senators Slam Online Advertisers As 'Malvertising' Spikes
Last Message: 5/19/2014
 |  Comments: 1
NSA Reportedly Adds Backdoors To US-Made Routers
Last Message: 5/19/2014
 |  Comments: 6
OpenDNS Receives $35M Investment in Enterprise Security Vision
Last Message: 5/19/2014
 |  Comments: 1
Gawker Attacker Turned FBI Informant, Pursued Other Hackers
Last Message: 5/19/2014
 |  Comments: 1
Microsoft Blocks Zero-Day Attacks Targeting IE, Office
Last Message: 5/19/2014
 |  Comments: 1
Dispelling The Myths Of Cyber Security
Last Message: 5/19/2014
 |  Comments: 3
Study: Data Breaches Make Huge Impact On Brand Reputation
Last Message: 5/18/2014
 |  Comments: 9
Breach At Bit.ly Blamed On Offsite Backup Storage Provider
Last Message: 5/16/2014
 |  Comments: 2
Into The Breach: The Limits Of Data Security Technology
Last Message: 5/16/2014
 |  Comments: 8
A New Approach to Endpoint Security: Think Positive
Last Message: 5/16/2014
 |  Comments: 10
How To Avoid Sloppy Authentication
Last Message: 5/15/2014
 |  Comments: 2
Navy Nuclear Carrier Sysadmin Busted For Hacking Databases
Last Message: 5/15/2014
 |  Comments: 5
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4278
PUBLISHED: 2022-12-03
A vulnerability was found in SourceCodester Book Store Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /hrm/employeeadd.php. The manipulation of the argument empid leads to sql injection. The attack may be initiated remotely. The exploit h...
CVE-2022-4279
PUBLISHED: 2022-12-03
A vulnerability classified as problematic has been found in SourceCodester Human Resource Management System 1.0. Affected is an unknown function of the file /hrm/employeeview.php. The manipulation of the argument search leads to cross site scripting. It is possible to launch the attack remotely. The...
CVE-2022-4280
PUBLISHED: 2022-12-03
A vulnerability, which was classified as problematic, has been found in Dot Tech Smart Campus System. Affected by this issue is some unknown functionality of the file /services/Card/findUser. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been ...
CVE-2022-4277
PUBLISHED: 2022-12-03
A vulnerability was found in Shaoxing Background Management System. It has been declared as critical. This vulnerability affects unknown code of the file /Default/Bd. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to t...
CVE-2022-4275
PUBLISHED: 2022-12-03
A vulnerability has been found in House Rental System and classified as critical. Affected by this vulnerability is an unknown functionality of the file search-property.php of the component POST Request Handler. The manipulation of the argument search_property leads to sql injection. The attack can ...