Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Upcoming Webinars

Webinar Archives
Defeating Advanced Adversaries with Tactical Analytics
Date: Nov 19, 2019
View webinar
In this webinar, you will be provided with a clear and technical plan on how to transition to SOC 3.0 and, most importantly, on how to establish a tactical analytics capability to effectively detect and defeat advanced adversaries.

Building a Security Culture
Date: Nov 14, 2019
View webinar
In this webinar, learn the elements of a security culture, how to build one at your organization, and how to know it's working.

Digital Transformation is Wreaking Havoc on Your Network!
Date: Nov 12, 2019
View webinar
Join our webinar to learn how to build an efficient network architecture to increase visibility, improve security and maximize tool investments to provide a delightful digital experience.

[Unified Communications Security] How Analytics Addresses the Threats You Don't Even Know About
Date: Nov 12, 2019
View webinar
As unified communications (UC) adoption grows, so too do the bad actors who prey on vulnerabilities. The source of vulnerabilities stem from a lack of understanding risks and subsequent lack of best practices to address UC security threats. When a serious threat strikes, without the right security solutions -- that can see across the entire UC network -- IT staff will only have reactive after-the-fact options. Wondering what can your organization to best protect themselves from these bad actors? Then this webinar is for you.

Protecting Your Org's Most Critical Data 101
Date: Nov 06, 2019
View webinar
If you'd like to know more about the latest strategies for data defense - especially strategies for protecting your most essential information -- this Dark Reading virtual event is for you.

Implementing an Effective Defense Against Ransomware
Date: Nov 05, 2019
View webinar
This webinar will provide expert advice on how to stop ransomware from infecting your critical systems and data --and what to do if your defenses fail.

Forecast Calls for 'EPYC' Innovation and Discovery
Date: Oct 31, 2019
View webinar
In this webinar, we'll discuss how new technology can help you harness AI, machine and deep learning with high performance computing (HPC). HPC is helping make the impossible possible such as transforming the treatment of diseases, cutting storm predictions in half, and helping organizations discover their next big business opportunity.

Wi-Fi 6: What you need to know now
Date: Oct 30, 2019
View webinar
This webinar delves into the technology enhancements Wi-Fi 6 will deliver, who might benefit, and real-world enterprise use cases. Learn what you need to do now to prepare for and be ready to capitalize on the transition to Wi-Fi 6

Building a Better IT Security Architecture for Your Enterprise
Date: Oct 23, 2019
View webinar
In this Dark Reading webinar, attendees will learn to build an overarching security architecture that is built on a stronger foundation and better anticipates the potential threats to your organization.

Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...
CVE-2019-4409
PUBLISHED: 2019-10-18
HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entere...
CVE-2019-13545
PUBLISHED: 2019-10-18
In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.
CVE-2019-13541
PUBLISHED: 2019-10-18
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.