Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Latest Message Boards
Page 1 / 2   >   >>
Five Common Cloud Configuration Mistakes
Last Message: 9/23/2019
 |  Comments: 1
"Hacking Higher Education"
Last Message: 9/23/2019
 |  Comments: 79
Security Pros Value Disclosure ... Sometimes
Last Message: 9/23/2019
 |  Comments: 1
Cartoon Contest: Bedtime Stories
Last Message: 9/23/2019
 |  Comments: 11
7 Ways VPNs Can Turn from Ally to Threat
Last Message: 9/23/2019
 |  Comments: 2
Crowdsourced Security & the Gig Economy
Last Message: 9/23/2019
 |  Comments: 1
Name That Toon: Sock Puppets
Last Message: 9/22/2019
 |  Comments: 18
Hackers Cash In On ATMs
Last Message: 9/21/2019
 |  Comments: 9
WeWork's Wi-Fi Exposed Files, Credentials, Emails
Last Message: 9/20/2019
 |  Comments: 1
White House Cybersecurity Strategy at a Crossroads
Last Message: 9/20/2019
 |  Comments: 7
Preventing PTSD and Burnout for Cybersecurity Professionals
Last Message: 9/20/2019
 |  Comments: 1
MITRE Releases 2019 List of Top 25 Software Weaknesses
Last Message: 9/19/2019
 |  Comments: 1
Battling Bots: How to Find Fake Twitter Followers
Last Message: 9/19/2019
 |  Comments: 11
The 20 Worst Metrics in Cybersecurity
Last Message: 9/19/2019
 |  Comments: 1
Cyber Criminals Focused on Credential Theft: Report
Last Message: 9/18/2019
 |  Comments: 1
US Turning Up the Heat on North Korea's Cyber Threat Operations
Last Message: 9/17/2019
 |  Comments: 3
Any Advice for Assessing Third-Party Risk?
Last Message: 9/17/2019
 |  Comments: 1
Privacy 2019: We're Not Ready
Last Message: 9/16/2019
 |  Comments: 2
6 Questions to Ask Once Youve Learned of a Breach
Last Message: 9/16/2019
 |  Comments: 1
Hackers Poison Google Search Results to Deliver Zeus Panda
Last Message: 9/16/2019
 |  Comments: 1
Unsecured IoT: 8 Ways Hackers Exploit Firmware Vulnerabilities
Last Message: 9/15/2019
 |  Comments: 8
Yahoo Agrees to $80 Million Settlement with Investors
Last Message: 9/14/2019
 |  Comments: 1
Third-Party Features Leave Websites More Vulnerable to Attack
Last Message: 9/14/2019
 |  Comments: 2
NetCAT Vulnerability Is Out of the Bag
Last Message: 9/12/2019
 |  Comments: 1
AI Is Everywhere, but Don't Ignore the Basics
Last Message: 9/12/2019
 |  Comments: 2
It's Not Healthy to Confuse Compliance with Security
Last Message: 9/12/2019
 |  Comments: 5
Security & the Infinite Capacity to Rationalize
Last Message: 9/12/2019
 |  Comments: 2
Fed Kaspersky Ban Made Permanent by New Rules
Last Message: 9/11/2019
 |  Comments: 1
Cartoon: Identity Theft Mitigation
Last Message: 9/11/2019
 |  Comments: 7
Crimeware: How Criminals Built a Business to Target Businesses
Last Message: 9/10/2019
 |  Comments: 1
Why Businesses Fail to Address DNS Security Exposures
Last Message: 9/10/2019
 |  Comments: 2
More Than 99% of Cyberattacks Need Victims' Help
Last Message: 9/10/2019
 |  Comments: 1
What Are the First Signs of a Cloud Data Leak?
Last Message: 9/10/2019
 |  Comments: 1
Black Hat: A Summer Break from the Mundane and Controllable
Last Message: 9/10/2019
 |  Comments: 1
Texas Refuses to Pay $2.5M in Massive Ransomware Attack
Last Message: 9/9/2019
 |  Comments: 1
Automation: Friend of the SOC Analyst
Last Message: 9/9/2019
 |  Comments: 1
The 7 Most Common RATS In Use Today
Last Message: 9/7/2019
 |  Comments: 4
Phishing Campaign Uses SharePoint to Slip Past Defenses
Last Message: 9/6/2019
 |  Comments: 2
ISAC 101: Unlocking the Power of Information
Last Message: 9/6/2019
 |  Comments: 1
"NSA Surveillance Can Penetrate VPNs"
Last Message: 9/6/2019
 |  Comments: 5
7 Steps to Web App Security
Last Message: 9/5/2019
 |  Comments: 1
6 Actions That Made GDPR Real in 2019
Last Message: 9/5/2019
 |  Comments: 1
Effective Pen Tests Follow These 7 Steps
Last Message: 9/5/2019
 |  Comments: 1
419M Facebook User Phone Numbers Publicly Exposed
Last Message: 9/5/2019
 |  Comments: 1
D-Link Agrees to Strengthen Device Security
Last Message: 9/4/2019
 |  Comments: 1
Upping the Ante on Anti-Analysis
Last Message: 9/3/2019
 |  Comments: 1
Page 1 / 2   >   >>


US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
7 Ways VPNs Can Turn from Ally to Threat
Curtis Franklin Jr., Senior Editor at Dark Reading,  9/21/2019
Security Pros Value Disclosure ... Sometimes
Dark Reading Staff 9/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I wish they'd put a sock in it.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16706
PUBLISHED: 2019-09-23
kkcms v1.3 has a CSRF vulnerablity that can add an user account via admin/cms_user_add.php.
CVE-2019-16705
PUBLISHED: 2019-09-23
Ming (aka libming) 0.4.8 has an out of bounds read vulnerability in the function OpCode() in the decompile.c file in libutil.a.
CVE-2019-16703
PUBLISHED: 2019-09-23
admin/infolist_add.php in PHPMyWind 5.6 has stored XSS.
CVE-2019-16704
PUBLISHED: 2019-09-23
admin/infoclass_update.php in PHPMyWind 5.6 has stored XSS.
CVE-2019-16702
PUBLISHED: 2019-09-23
Integard Pro 2.2.0.9026 allows remote attackers to execute arbitrary code via a buffer overflow involving a long NoJs parameter to the /LoginAdmin URI.