Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Latest Message Boards
Page 1 / 2   >   >>
How Attackers Infiltrate the Supply Chain & What to Do About It
Last Message: 7/18/2019
 |  Comments: 2
Name That Toon: Beat the Heat
Last Message: 7/17/2019
 |  Comments: 18
Data Loss, Leakage Top Cloud Security Concerns
Last Message: 7/17/2019
 |  Comments: 1
US Mayors Commit to Just Saying No to Ransomware
Last Message: 7/17/2019
 |  Comments: 3
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Last Message: 7/16/2019
 |  Comments: 6
Symantec Builds Out Cloud Portfolio to Enforce 'Zero Trust'
Last Message: 7/16/2019
 |  Comments: 1
7 Ways to Mitigate Supply Chain Attacks
Last Message: 7/16/2019
 |  Comments: 5
Industry Insight: Checking Up on Healthcare Security
Last Message: 7/16/2019
 |  Comments: 1
We're Still Not Ready for GDPR? What is Wrong With Us?
Last Message: 7/16/2019
 |  Comments: 2
A Lawyers Guide to Cyber Insurance: 4 Basic Tips
Last Message: 7/16/2019
 |  Comments: 3
Chronicle Folds into Google
Last Message: 7/16/2019
 |  Comments: 3
Where Businesses Waste Endpoint Security Budgets
Last Message: 7/16/2019
 |  Comments: 3
"Hacking Higher Education"
Last Message: 7/16/2019
 |  Comments: 73
Breach in Stanford System Exposes Student Records
Last Message: 7/16/2019
 |  Comments: 1
Flaws in Telegram & WhatsApp on Android Put Data at Risk
Last Message: 7/16/2019
 |  Comments: 1
Developers and Security Teams Under Pressure to Collaborate
Last Message: 7/15/2019
 |  Comments: 12
Hackers Cash In On ATMs
Last Message: 7/15/2019
 |  Comments: 9
Competing Priorities Mean Security Risks for Small Businesses
Last Message: 7/15/2019
 |  Comments: 2
Financial Firms Face Threats from Employee Mobile Devices
Last Message: 7/14/2019
 |  Comments: 1
7 Hot Cybersecurity Trends to Be Highlighted at Black Hat
Last Message: 7/14/2019
 |  Comments: 2
Summer: A Time for Vacations & Cyberattacks?
Last Message: 7/14/2019
 |  Comments: 1
The Security of Cloud Applications
Last Message: 7/14/2019
 |  Comments: 4
Theres a Security Incident in the Cloud: Whos Responsible?
Last Message: 7/14/2019
 |  Comments: 1
German Schools Ban Office 365, Cite Privacy Concerns
Last Message: 7/12/2019
 |  Comments: 1
Data Center Changes Push Cyber Risk to Network's Edge
Last Message: 7/12/2019
 |  Comments: 1
Hide and Seek Brings Persistence to IoT Botnets
Last Message: 7/12/2019
 |  Comments: 2
4 Reasons Why SOC Superstars Quit
Last Message: 7/12/2019
 |  Comments: 1
Contest: Name That Toon
Last Message: 7/12/2019
 |  Comments: 2
FBI Paid Hackers To Help Unlock San Bernardino Shooters iPhone
Last Message: 7/11/2019
 |  Comments: 1
Marriott Faces $124 Million GDPR Fine in UK
Last Message: 7/11/2019
 |  Comments: 1
Why You Need a Global View of IT Assets
Last Message: 7/10/2019
 |  Comments: 1
Cloud Security and Risk Mitigation
Last Message: 7/9/2019
 |  Comments: 1
How Do I Get Management to Buy into a SecDevOps Program?
Last Message: 7/9/2019
 |  Comments: 1
How Can I Protect My Company Without a Security Staff?
Last Message: 7/9/2019
 |  Comments: 1
8 Steps to More Effective Small Business Security
Last Message: 7/9/2019
 |  Comments: 1
Deconstructing the Cyber Kill Chain
Last Message: 7/8/2019
 |  Comments: 12
Lake City Employee Fired Following Ransom Payment
Last Message: 7/8/2019
 |  Comments: 11
NIST Sets Draft Guidelines for Government AI
Last Message: 7/8/2019
 |  Comments: 1
The 10 Essential Basics of Infosec Forensics
Last Message: 7/8/2019
 |  Comments: 2
Disarming Employee Weaponization
Last Message: 7/8/2019
 |  Comments: 1
Deep Instinct Touts Predictive Aspects of Deep Learning
Last Message: 7/8/2019
 |  Comments: 3
More Than Half of SMB Devices Run Outdated Operating Systems
Last Message: 7/6/2019
 |  Comments: 4
UK Forensics Firm Paid Ransom in Cyberattack
Last Message: 7/6/2019
 |  Comments: 1
Ransomware Hits Georgia Court System
Last Message: 7/6/2019
 |  Comments: 1
Page 1 / 2   >   >>


The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13643
PUBLISHED: 2019-07-18
Stored XSS in EspoCRM before 5.6.4 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The attack begins by storing a new stream message containing an XSS payload. The stored payload can then be triggered by clicking a malicious link on the...
CVE-2019-13644
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.1 is vulnerable to stored XSS due to lack of filtration of user-supplied data in a budget name. The JavaScript code is contained in a transaction, and is executed on the tags/show/$tag_number$ tag summary page.
CVE-2019-13645
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing.
CVE-2019-13646
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to reflected XSS due to lack of filtration of user-supplied data in a search query.
CVE-2019-13647
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file content. The JavaScript code is executed during attachments/view/$file_id$ attachment viewing.