Upcoming Webinars

Webinar Archives
Overcoming Cyberthreats to Critical Infrastructure with Integrated IT/OT Cybersecurity
Date: Mar 06, 2019
View webinar
Security professionals interested in effectively executing an integrated IT/OT cybersecurity strategy should join this webinar to learn how they can achieve end-to-end visibility into the full spectrum of both IT and OT network devices, as well as unified business risk management for today's continuously evolving cyberthreat landscape.

Closing the Threat Intelligence Effectiveness Gap
Date: Feb 27, 2019
View webinar
This webinar will cover the State of threat detection, eight best practices in threat intelligence, threat detection strategies and threat hunting and more. Learn more.

Understanding and Preventing Social Engineering Attacks
Date: Feb 20, 2019
View webinar
How can enterprises prevent "social engineering" attacks? Can users be trained to recognize such exploits and avoid them? Join Dark Reading as we invite top experts to discuss the most effective methods of defending against social engineering attacks.

Practical Cyber Defense for ICS
Date: Feb 14, 2019
View webinar
In this Dark Reading webinar, top experts offer insight on the threat posed to Industrial control systems (ICS) systems, and how you can expand your security strategies to protect them.

Hadoop is Cool - Again!
Date: Jan 31, 2019
View webinar
In this webinar, you will learn about 3 Hadoop trends that can impact the way you do data analytics.

3 Ways Replacing AV with a Security Platform Can Help You
Date: Jan 31, 2019
View webinar
What if it was possible to have a single platform that simplified your security stack and improved your protection? Register and join us for this live webinar to find out more.

How You Can Use Machine Learning to Improve Data Defense
Date: Jan 29, 2019
View webinar
In this webinar, experts will discuss the ways that machine learning can help in security operations, how it can speed threat analysis, and how to evaluate and choose technologies that will work in your organization.

Choosing the Right Strategies for Endpoint Security
Date: Jan 23, 2019
View webinar
In this webinar, experts will discuss methods for rationalizing endpoint protection tools and strategies and building a comprehensive strategy that works across the entire organization.

Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6691
PUBLISHED: 2019-01-23
phpwind 9.0.2.170426 UTF8 allows SQL Injection via the admin.php?m=backup&c=backup&a=doback tabledb[] parameter, related to the "--backup database" option.
CVE-2018-19019
PUBLISHED: 2019-01-22
A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
CVE-2019-6260
PUBLISHED: 2019-01-22
The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and firmware implement Advanced High-performance Bus (AHB) bridges, which allow arbitrary read and write access to the BMC's physical address space from the host (or from the network in unusual cases where the BMC console u...
CVE-2018-19011
PUBLISHED: 2019-01-22
CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application.
CVE-2018-19013
PUBLISHED: 2019-01-22
An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file.