Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in September 2019
7 Ways VPNs Can Turn from Ally to Threat
Last Message: 9/30/2019
 |  Comments: 3
iOS Hack Lets Attackers Brute Force iPhone, iPad Passcodes
Last Message: 9/30/2019
 |  Comments: 2
The Etiquette of Respecting Privacy in the Age of IoT
Last Message: 9/28/2019
 |  Comments: 1
Deutsche Bank Email Vulnerability Left Ex-Employees with Access
Last Message: 9/27/2019
 |  Comments: 2
Voting Machine Systems New & Old Contain 'Design' Flaws
Last Message: 9/27/2019
 |  Comments: 1
Cartoon: Dating (In)security
Last Message: 9/27/2019
 |  Comments: 7
From Hacking Systems To Hacking People
Last Message: 9/26/2019
 |  Comments: 8
AI Is Everywhere, but Don't Ignore the Basics
Last Message: 9/25/2019
 |  Comments: 8
How to Define & Prioritize Risk Management Goals
Last Message: 9/25/2019
 |  Comments: 1
Name That Toon: Beat the Heat
Last Message: 9/25/2019
 |  Comments: 59
Don't Just Tune Your SIEM, Retune It
Last Message: 9/24/2019
 |  Comments: 1
WeWork's Wi-Fi Exposed Files, Credentials, Emails
Last Message: 9/24/2019
 |  Comments: 2
Automation: Friend of the SOC Analyst
Last Message: 9/23/2019
 |  Comments: 2
Cartoon Contest: Bedtime Stories
Last Message: 9/23/2019
 |  Comments: 11
Crowdsourced Security & the Gig Economy
Last Message: 9/23/2019
 |  Comments: 1
Cyber Criminals Focused on Credential Theft: Report
Last Message: 9/18/2019
 |  Comments: 1
US Turning Up the Heat on North Korea's Cyber Threat Operations
Last Message: 9/17/2019
 |  Comments: 3
Privacy 2019: We're Not Ready
Last Message: 9/16/2019
 |  Comments: 2
Hackers Poison Google Search Results to Deliver Zeus Panda
Last Message: 9/16/2019
 |  Comments: 1
Unsecured IoT: 8 Ways Hackers Exploit Firmware Vulnerabilities
Last Message: 9/15/2019
 |  Comments: 8
Third-Party Features Leave Websites More Vulnerable to Attack
Last Message: 9/14/2019
 |  Comments: 2
It's Not Healthy to Confuse Compliance with Security
Last Message: 9/12/2019
 |  Comments: 5
Security & the Infinite Capacity to Rationalize
Last Message: 9/12/2019
 |  Comments: 2
Fed Kaspersky Ban Made Permanent by New Rules
Last Message: 9/11/2019
 |  Comments: 1
Cartoon: Identity Theft Mitigation
Last Message: 9/11/2019
 |  Comments: 7
What Are the First Signs of a Cloud Data Leak?
Last Message: 9/10/2019
 |  Comments: 1
The 7 Most Common RATS In Use Today
Last Message: 9/7/2019
 |  Comments: 4
Phishing Campaign Uses SharePoint to Slip Past Defenses
Last Message: 9/6/2019
 |  Comments: 2
ISAC 101: Unlocking the Power of Information
Last Message: 9/6/2019
 |  Comments: 1
7 Steps to Web App Security
Last Message: 9/5/2019
 |  Comments: 1
Effective Pen Tests Follow These 7 Steps
Last Message: 9/5/2019
 |  Comments: 1
D-Link Agrees to Strengthen Device Security
Last Message: 9/4/2019
 |  Comments: 1
Upping the Ante on Anti-Analysis
Last Message: 9/3/2019
 |  Comments: 1
Imperva Customer Database Exposed
Last Message: 9/3/2019
 |  Comments: 10
Consumers Urged to Secure Their Digital Lives
Last Message: 9/3/2019
 |  Comments: 1
@jack Got Hacked: Twitter CEO's Tweets Hijacked
Last Message: 9/3/2019
 |  Comments: 2
Malware Found in Android App with 100M Users
Last Message: 9/3/2019
 |  Comments: 7
Retadup Worm Squashed After Infecting 850K Machines
Last Message: 9/3/2019
 |  Comments: 1
RIG Exploit Kit Takedown Sheds Light on Domain Shadowing
Last Message: 9/2/2019
 |  Comments: 1
The Rising Tide of Crimeware-as-a-Service
Last Message: 9/2/2019
 |  Comments: 3
WannaCry Remains No. 1 Ransomware Weapon
Last Message: 9/2/2019
 |  Comments: 16
Old Threats Are New Again
Last Message: 9/1/2019
 |  Comments: 1


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4144
PUBLISHED: 2022-11-29
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use th...
CVE-2022-4172
PUBLISHED: 2022-11-29
An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest...
CVE-2022-46150
PUBLISHED: 2022-11-29
Discourse is an open-source discussion platform. Prior to version 2.8.13 of the `stable` branch and version 2.9.0.beta14 of the `beta` and `tests-passed` branches, unauthorized users may learn of the existence of hidden tags and that they have been applied to topics that they have access to. This is...
CVE-2022-21126
PUBLISHED: 2022-11-29
The package com.github.samtools:htsjdk before 3.0.1 are vulnerable to Creation of Temporary File in Directory with Insecure Permissions due to the createTempDir() function in util/IOUtil.java not checking for the existence of the temporary directory before attempting to create it.
CVE-2022-25848
PUBLISHED: 2022-11-29
This affects all versions of package static-dev-server. This is because when paths from users to the root directory are joined, the assets for the path accessed are relative to that of the root directory.