Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Dark Reading Now HTTPS
Newest First  |  Oldest First  |  Threaded View
csanders
csanders,
User Rank: Author
9/20/2017 | 2:29:04 PM
Re: Not Showing HTTPS is being secure
Yes, it seems they still use mixed content (embbeded content from non-HTTPS sites). In this event it is still possible for attackers to inject content into the site if they are MITMing your connection. Additionally, it may be  possible for a passive individual monitoring the network to determine what article/page you are looking at based on other non-HTTPS pages that were requested. Still this is a good first step on the path to providing a fully secured experience. 
Hack4GoodNotBad
Hack4GoodNotBad,
User Rank: Apprentice
9/1/2017 | 2:09:47 PM
Not Showing HTTPS is being secure
When I am this site and using chrome, I do not see the secure message like other https sites 

This is the message chrome shows when looking at the https

your connection to this site is not fully secure

 
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
8/31/2017 | 5:49:49 PM
Hurrah!
As a leading InfoSec pub, this is an important step in DR's evolution. Glad to see this update to the site!
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
8/30/2017 | 9:12:53 AM
Re: HTTPS: not quite right
Thanks for calling our attention to this. We are looking into it. -The Editors
KeesM
KeesM,
User Rank: Apprentice
8/30/2017 | 3:26:17 AM
HTTPS: not quite right
Unfortunately, when clicking the HTTPS link, I got redirected to a page stating:

Server Error in Application "WWW.DARKREADING.COM"
HTTP Error 404.0 - Not Found
The resource you are looking for has been removed, had its name changed, or is temporarily unavailable.
Requested URL    ht tp://www.darkreading.com:80/admin/ ht tps:/www.darkreading.com/
Physical Path    d:\live\web\www.darkreading.com\admin\ ht tps:\www.darkreading.com\
(without spaces between ht tp)


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-29349
PUBLISHED: 2022-05-25
kkFileView v4.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the url parameter at /controller/OnlinePreviewController.java.
CVE-2022-29358
PUBLISHED: 2022-05-25
epub2txt2 v2.04 was discovered to contain an integer overflow via the function bug in _parse_special_tag at sxmlc.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted XML file.
CVE-2022-29359
PUBLISHED: 2022-05-25
A stored cross-site scripting (XSS) vulnerability in /scas/?page=clubs/application_form&id=7 of School Club Application System v0.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.
CVE-2022-29361
PUBLISHED: 2022-05-25
Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body.
CVE-2022-29362
PUBLISHED: 2022-05-25
A cross-site scripting (XSS) vulnerability in /navigation/create?ParentID=%23 of ZKEACMS v3.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ParentID parameter.