Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Latest Message Boards
Page 1 / 2   >   >>
7 Tips for Infosec Pros Considering A Lateral Career Move
Last Message: 1/22/2020
 |  Comments: 1
7 Free Tools for Better Visibility Into Your Network
Last Message: 1/22/2020
 |  Comments: 3
Big Changes Are Coming to Security Analytics & Operations
Last Message: 1/22/2020
 |  Comments: 2
HP Launches Printer Bug Bounty Program
Last Message: 1/22/2020
 |  Comments: 2
Name that Toon: Staircase to the Cloud
Last Message: 1/21/2020
 |  Comments: 9
TikTok Bugs Put Users' Videos, Personal Data At Risk
Last Message: 1/20/2020
 |  Comments: 1
Will This Be the Year of the Branded Cybercriminal?
Last Message: 1/20/2020
 |  Comments: 2
Google Lets iPhone Users Turn Device into Security Key
Last Message: 1/20/2020
 |  Comments: 1
The Three Dimensions of the Threat Intelligence Scale Problem
Last Message: 1/20/2020
 |  Comments: 5
Mobile Banking Malware Up 50% in First Half of 2019
Last Message: 1/19/2020
 |  Comments: 3
More Than 100 Flavors Of Malware Are Stealing Bitcoins
Last Message: 1/19/2020
 |  Comments: 2
How Secure are our Voting Systems for November 2018?
Last Message: 1/19/2020
 |  Comments: 12
Battling Bots: How to Find Fake Twitter Followers
Last Message: 1/19/2020
 |  Comments: 31
Active Directory Needs an Update: Here's Why
Last Message: 1/19/2020
 |  Comments: 2
Ransomware Trains Its Sights on Cloud Providers
Last Message: 1/19/2020
 |  Comments: 7
Microsoft to Officially End Support for Windows 7, Server 2008
Last Message: 1/18/2020
 |  Comments: 2
Write A Caption & Win A Prize
Last Message: 1/17/2020
 |  Comments: 132
Car Hacking Hits the Streets
Last Message: 1/17/2020
 |  Comments: 2
6 Security Team Goals for DevSecOps in 2020
Last Message: 1/17/2020
 |  Comments: 1
New Attack Campaigns Suggest Emotet Threat Is Far From Over
Last Message: 1/17/2020
 |  Comments: 1
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Last Message: 1/17/2020
 |  Comments: 1
What Adobe's New PDF Sandbox Really Means For Attackers
Last Message: 1/16/2020
 |  Comments: 1
Securing The PDF
Last Message: 1/16/2020
 |  Comments: 1
Cloud Services Require a Shift in Security Strategy
Last Message: 1/16/2020
 |  Comments: 2
Mobile App Back-End Servers, Databases at Risk
Last Message: 1/15/2020
 |  Comments: 3
Microsoft Patches Windows Vuln Discovered by the NSA
Last Message: 1/15/2020
 |  Comments: 1
Asset Management Becomes the New Security Model
Last Message: 1/14/2020
 |  Comments: 1
Make DNS a Cornerstone of Your Cyber Security Arsenal
Last Message: 1/14/2020
 |  Comments: 1
Time to Get Smarter About Threat Intel
Last Message: 1/14/2020
 |  Comments: 1
Analytics and Data Prove Effective Security Hybrid
Last Message: 1/14/2020
 |  Comments: 1
Regular User Training Most Effective Security Antidote
Last Message: 1/14/2020
 |  Comments: 1
App Security Still Dogs Developers, End-User Organizations
Last Message: 1/14/2020
 |  Comments: 2
The Coolest Hacks of 2019
Last Message: 1/13/2020
 |  Comments: 4
5 Security Resolutions to Prevent a Ransomware Attack in 2020
Last Message: 1/12/2020
 |  Comments: 5
AWS Issues 'Urgent' Warning for Database Users to Update Certs
Last Message: 1/10/2020
 |  Comments: 1
In App Development, Does No-Code Mean No Security?
Last Message: 1/10/2020
 |  Comments: 2
"Hacking Higher Education"
Last Message: 1/10/2020
 |  Comments: 90
DHS Warns of Potential Iranian Cyberattacks
Last Message: 1/9/2020
 |  Comments: 1
10 Women in Security You May Not Know But Should
Last Message: 1/9/2020
 |  Comments: 8
Page 1 / 2   >   >>


Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
New Attack Campaigns Suggest Emotet Threat Is Far From Over
Jai Vijayan, Contributing Writer,  1/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20399
PUBLISHED: 2020-01-23
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
CVE-2020-7915
PUBLISHED: 2020-01-22
An issue was discovered on Eaton 5P 850 devices. The Ubicacion SAI field allows XSS attacks by an administrator.
CVE-2019-20391
PUBLISHED: 2020-01-22
An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash.
CVE-2019-20392
PUBLISHED: 2020-01-22
An invalid memory access flaw is present in libyang before v1.0-r1 in the function resolve_feature_value() when an if-feature statement is used inside a list key node, and the feature used is not defined. Applications that use libyang to parse untrusted input yang files may crash.
CVE-2019-20393
PUBLISHED: 2020-01-22
A double-free is present in libyang before v1.0-r1 in the function yyparse() when an empty description is used. Applications that use libyang to parse untrusted input yang files may be vulnerable to this flaw, which would cause a crash or potentially code execution.