Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in July 2017
<<   <   Page 2 / 2
Symantec to Buy 'Browser Isolation' Firm Fireglass
Last Message: 7/6/2017
 |  Comments: 1
The Case for Crowdsourcing Security Buying Decisions
Last Message: 7/6/2017
 |  Comments: 6
8 Hot Skills Sought By IT Security Departments
Last Message: 7/5/2017
 |  Comments: 2
8tracks Hit With Breach of 18 Million Accounts
Last Message: 7/5/2017
 |  Comments: 1
Hacking Factory Robot Arms for Sabotage, Fun & Profit
Last Message: 7/4/2017
 |  Comments: 3
Apple iOS Threats Fewer Than Android But More Deadly
Last Message: 7/4/2017
 |  Comments: 5
Samsung Galaxy Security Alert: Android Backdoor Discovered
Last Message: 7/3/2017
 |  Comments: 1
8 Things Every Security Pro Should Know About GDPR
Last Message: 7/3/2017
 |  Comments: 1
Why Enterprise Security Needs a New Focus
Last Message: 7/2/2017
 |  Comments: 7
Look, But Don't Touch: One Key to Better ICS Security
Last Message: 7/2/2017
 |  Comments: 1
Compliance in the Cloud Needs To Be Continuous & Automated
Last Message: 7/2/2017
 |  Comments: 8
Anthem Agrees to $115 Million Settlement for 2015 Breach
Last Message: 7/1/2017
 |  Comments: 16
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-09-30
sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service.
PUBLISHED: 2022-09-30
Relative Path Traversal in GitHub repository dnnsoftware/dnn.platform prior to 9.11.0.
PUBLISHED: 2022-09-30
drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.
PUBLISHED: 2022-09-30
roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-&gt;value is in progress.
PUBLISHED: 2022-09-30
drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.