Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
COVID-19: Latest Security News & Commentary
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
steve7876
steve7876,
User Rank: Apprentice
9/28/2020 | 10:47:05 AM
Re: Thank you
Due to COVID 19, the world and every human life have been changed. I influence real estate photography the rate of any country is increased. that is a terrible sign. The countries not doing trade among themselves. We need to make some fast steps to control the COVID.

Fantou
Fantou,
User Rank: Apprentice
9/14/2020 | 6:06:33 PM
Re: Thank you
Hi Do you think that  figures from Covid Cases and death ( due to Covid 19 )  are right or manipulated in the US. It's not my opinion however it is from many in Europe ( I am from France )

 

thanks for your answer.
kavyaahuja011
kavyaahuja011,
User Rank: Apprentice
9/6/2020 | 3:20:26 PM
Re: - cool
cool
nuritakartika
nuritakartika,
User Rank: Apprentice
8/4/2020 | 11:52:59 PM
Re: Effective Grouping
yes agree for you
quanganh189
quanganh189,
User Rank: Apprentice
7/28/2020 | 10:53:51 AM
Re: Thank you
i think you're wrong
RyanSepe
RyanSepe,
User Rank: Ninja
7/19/2020 | 2:47:30 PM
Re: Thank you
Yeah, unfortunately true. Too many individuals being obstinant to safety protocols. Due to that it will take a vaccine to completely get through this.
nhunganh18
nhunganh18,
User Rank: Apprentice
7/16/2020 | 3:48:30 AM
Re: Effective Grouping
great
RyanSepe
RyanSepe,
User Rank: Ninja
6/24/2020 | 12:19:21 PM
Good Intentions
I think the intentions of these collections are good but in the next iteration can we have them grouped or indexed? I think this would be helpful to dive down into articles by categories of interest.
jaxonburkitt
jaxonburkitt,
User Rank: Apprentice
5/4/2020 | 11:17:27 AM
Re: Effective Grouping
thanks
LucasNugan
LucasNugan,
User Rank: Apprentice
5/3/2020 | 11:17:03 PM
Re: Effective Grouping
Aggred 
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-42003
PUBLISHED: 2022-10-02
In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
CVE-2022-42004
PUBLISHED: 2022-10-02
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
CVE-2022-42002
PUBLISHED: 2022-10-01
SonicJS through 0.6.0 allows file overwrite. It has the following mutations that are used for updating files: fileCreate and fileUpdate. Both of these mutations can be called without any authentication to overwrite any files on a SonicJS application, leading to Arbitrary File Write and Delete.
CVE-2022-39268
PUBLISHED: 2022-09-30
### Impact In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end use...
CVE-2022-34428
PUBLISHED: 2022-09-30
Dell Hybrid Client prior to version 1.8 contains a Regular Expression Denial of Service Vulnerability in the UI. An adversary with WMS group admin access could potentially exploit this vulnerability, leading to temporary denial-of-service.