Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Latest Message Boards
Page 1 / 2   >   >>
Mirai Groups Target Business IoT Devices
Last Message: 7/23/2019
 |  Comments: 1
RDP Bug Takes New Approach to Host Compromise
Last Message: 7/22/2019
 |  Comments: 3
How Cybercriminals Break into the Microsoft Cloud
Last Message: 7/22/2019
 |  Comments: 1
Contest: Name That Toon
Last Message: 7/22/2019
 |  Comments: 8
Deep Instinct Touts Predictive Aspects of Deep Learning
Last Message: 7/22/2019
 |  Comments: 4
Ex-NSA Contractor Gets 9 Years for Retaining Defense Data
Last Message: 7/22/2019
 |  Comments: 3
Name That Toon: Beat the Heat
Last Message: 7/22/2019
 |  Comments: 31
Competing Priorities Mean Security Risks for Small Businesses
Last Message: 7/22/2019
 |  Comments: 6
Toyota's Car-Hacking Tool Now Available
Last Message: 7/22/2019
 |  Comments: 3
Financial Firms Face Threats from Employee Mobile Devices
Last Message: 7/22/2019
 |  Comments: 3
Intelligent Authentication Market Grows to Meet Demand
Last Message: 7/22/2019
 |  Comments: 1
Power Outage Hits Millions in South America
Last Message: 7/22/2019
 |  Comments: 1
Europol Head Fears 5G Will Give Criminals an Edge
Last Message: 7/21/2019
 |  Comments: 1
Sprint Reveals Account Breach via Samsung Website
Last Message: 7/21/2019
 |  Comments: 1
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Last Message: 7/20/2019
 |  Comments: 5
MITRE ATT&CK Framework Not Just for the Big Guys
Last Message: 7/19/2019
 |  Comments: 1
4 Reasons Why SOC Superstars Quit
Last Message: 7/19/2019
 |  Comments: 3
For Real Security, Don't Let Failure Be Your Measure of Success
Last Message: 7/19/2019
 |  Comments: 1
Calculating the Value of Security
Last Message: 7/19/2019
 |  Comments: 1
"Hacking Higher Education"
Last Message: 7/19/2019
 |  Comments: 75
8 Legit Tools and Utilities That Cybercriminals Commonly Misuse
Last Message: 7/19/2019
 |  Comments: 1
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Last Message: 7/19/2019
 |  Comments: 3
7 Ways to Mitigate Supply Chain Attacks
Last Message: 7/19/2019
 |  Comments: 6
How to Catch a Phish: Where Employee Awareness Falls Short
Last Message: 7/19/2019
 |  Comments: 1
Why a Healthy Data Diet Is the Secret to Healthy Security
Last Message: 7/19/2019
 |  Comments: 2
How Attackers Infiltrate the Supply Chain & What to Do About It
Last Message: 7/18/2019
 |  Comments: 3
Data Loss, Leakage Top Cloud Security Concerns
Last Message: 7/17/2019
 |  Comments: 1
US Mayors Commit to Just Saying No to Ransomware
Last Message: 7/17/2019
 |  Comments: 3
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Last Message: 7/16/2019
 |  Comments: 6
Symantec Builds Out Cloud Portfolio to Enforce 'Zero Trust'
Last Message: 7/16/2019
 |  Comments: 1
Industry Insight: Checking Up on Healthcare Security
Last Message: 7/16/2019
 |  Comments: 1
We're Still Not Ready for GDPR? What is Wrong With Us?
Last Message: 7/16/2019
 |  Comments: 2
A Lawyers Guide to Cyber Insurance: 4 Basic Tips
Last Message: 7/16/2019
 |  Comments: 3
Chronicle Folds into Google
Last Message: 7/16/2019
 |  Comments: 3
Where Businesses Waste Endpoint Security Budgets
Last Message: 7/16/2019
 |  Comments: 3
Breach in Stanford System Exposes Student Records
Last Message: 7/16/2019
 |  Comments: 1
Flaws in Telegram & WhatsApp on Android Put Data at Risk
Last Message: 7/16/2019
 |  Comments: 1
Developers and Security Teams Under Pressure to Collaborate
Last Message: 7/15/2019
 |  Comments: 12
Hackers Cash In On ATMs
Last Message: 7/15/2019
 |  Comments: 9
7 Hot Cybersecurity Trends to Be Highlighted at Black Hat
Last Message: 7/14/2019
 |  Comments: 2
Summer: A Time for Vacations & Cyberattacks?
Last Message: 7/14/2019
 |  Comments: 1
The Security of Cloud Applications
Last Message: 7/14/2019
 |  Comments: 4
Theres a Security Incident in the Cloud: Whos Responsible?
Last Message: 7/14/2019
 |  Comments: 1
German Schools Ban Office 365, Cite Privacy Concerns
Last Message: 7/12/2019
 |  Comments: 1
Data Center Changes Push Cyber Risk to Network's Edge
Last Message: 7/12/2019
 |  Comments: 1
Page 1 / 2   >   >>


How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12551
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the Memcpy function (provided by the scripting engine) allows an attacker to overwrite arbitrary memory, which could lead to code execution.
CVE-2019-12552
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, an integer overflow during the initialization of variables could allow an attacker to cause a denial of service.
CVE-2019-3414
PUBLISHED: 2019-07-22
All versions up to V1.19.20.02 of ZTE OTCP product are impacted by XSS vulnerability. Due to XSS, when an attacker invokes the security management to obtain the resources of the specified operation code owned by a user, the malicious script code could be transmitted in the parameter. If the front en...
CVE-2019-10102
PUBLISHED: 2019-07-22
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". Th...
CVE-2019-10102
PUBLISHED: 2019-07-22
aubio 0.4.8 and earlier is affected by: null pointer. The impact is: crash. The component is: filterbank. The attack vector is: pass invalid arguments to new_aubio_filterbank. The fixed version is: after commit eda95c9c22b4f0b466ae94c4708765eaae6e709e.