Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by Thomas Claburn

Thomas Claburn
Member Since: November 15, 2013
Posts: 76

Most Recently Posted

100 items
Comment: Make it so - Thomas Claburn - 11/18/2015
Comment: the lesson... - Thomas Claburn - 9/10/2015
Comment: Apple... - Thomas Claburn - 6/9/2015
Comment: cost benefits - Thomas Claburn - 5/6/2015
Comment: domain value - Thomas Claburn - 5/6/2015
Comment: Re: Bravo - Thomas Claburn - 4/15/2015
Comment: name required - Thomas Claburn - 3/18/2015
Comment: useful but - Thomas Claburn - 3/5/2015
Comment: a renter... - Thomas Claburn - 2/23/2015
Comment: a bit late - Thomas Claburn - 1/12/2015
Comment: Pro or con? - Thomas Claburn - 12/10/2014
Comment: employment - Thomas Claburn - 11/25/2014
Comment: Stuxnet - Thomas Claburn - 11/11/2014
Comment: trust - Thomas Claburn - 11/4/2014
Comment: maybe - Thomas Claburn - 10/20/2014
Comment: passwords - Thomas Claburn - 9/16/2014
Comment: Fortunately... - Thomas Claburn - 9/15/2014
Comment: Re: hackers - Thomas Claburn - 9/12/2014
Comment: Re: Nesting - Thomas Claburn - 8/14/2014
Comment: Somewhere... - Thomas Claburn - 5/13/2014
Comment: Re: exploits - Thomas Claburn - 4/9/2014
Comment: responsiveness - Thomas Claburn - 2/26/2014
Comment: 93 weeks? - Thomas Claburn - 2/19/2014
Comment: Education - Thomas Claburn - 1/17/2014
Comment: proof? - Thomas Claburn - 1/15/2014

COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-06
In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.
PUBLISHED: 2020-06-06
In WSO2 API Manager 3.0.0 and earlier, WSO2 API Microgateway 2.2.0, and WSO2 IS as Key Manager 5.9.0 and earlier, Management Console allows XXE during addition or update of a Lifecycle.
PUBLISHED: 2020-06-06
SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.