Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinar Archives

Upcoming Webinars
Cyber Attack Evasion Techniques
Date: Mar 23, 2020

View archived webinar

When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.

Shaking Off Security Alert Fatigue: Tips for Taking Control
Date: Mar 18, 2020

View archived webinar

Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the snooze button on your alarm clock. How can you manage security alerts so they are most meaningful to your business, and act on them in an appropriate, timely manner? 

Preventing Credential Theft & Account Takeovers
Date: Mar 10, 2020

View archived webinar

Breaches that expose passwords and grant cyber attackers access to privileged user accounts are now so common that users greet the news with more shrugs than shock, and security experts advise to "assume user credentials have been exposed." Yet, these attacks can be as catastrophic as they are commonplace.  Stolen credentials and account takeovers are the footholds cybercriminals use to launch all manner of attacks -- from financial fraud and virtual currency theft, to data breaches and cyber espionage. In this webinar learn how these bread-and-butter cyberattacks work and how to bolster your defenses against them.     

Zero-Trust In Practice
Date: Mar 05, 2020

View archived webinar

Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model – trust nothing, verify everything – is the proposed answer to this problem. But it’s easier said than done in real enterprise. In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you’ll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

Cloud Security Threats Enterprises Need to Watch
Date: Feb 19, 2020

View archived webinar

More businesses are shifting critical assets and operations to the cloud, as service providers enhance their security capabilities --and cyber attackers have adapted accordingly. In this webinar, experts outline the top ways that attackers are exploiting cloud services, applications and implementations and give advice on how to use the cloud more securely.

Building an Incident Readiness and Response Playbook
Date: Feb 11, 2020

View archived webinar

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident readiness and response playbook.

Linking, Orchestrating, and Managing Your Enterprise Security Systems
Date: Feb 04, 2020

View archived webinar
Over the years, most enterprises have purchased and installed a wide variety of security tools and technologies, from security gateways to firewalls to malware detection systems. Individually, they all solve a problem - but they often can't work together or speak a common language. In this webinar, experts will discuss methods and technologies for linking and integrating disparate security systems to provide a more comprehensive view of security threats - and a more structured data defense. You'll get advice on how to tie your security systems together, and how to automate security processes that work across multiple tools and technologies.
12 Ways to Defeat Multi-Factor Authentication and How To Stop the Bad Guys
Date: Jan 28, 2020

View archived webinar

Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution.

 

Getting the Most from Threat Intelligence
Date: Jan 23, 2020

View archived webinar

To get the most out of your relationships with information sharing groups (ISACs) and your threat intelligence feeds, you must understand how, why, and when other organizations' cyber attacks relate to your own organization.

In this webinar, learn how to take a fresh look at external threat intelligence and ensure you have an up-to-date view of attackers’ means, motives and opportunity.

Developing and Managing an Endpoint Security Strategy for Your Enterprise
Date: Jan 14, 2020

View archived webinar

Wireless devices. Mobile laptops that could be booted up from anywhere. Desktop systems loaded with sensitive information. Smartphones and smart TVs. For the IT security manager, the concept of “endpoint security” has evolved significantly over the past year or two. How is your enterprise approaching the endpoint security problem? In this webinar, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user might employ. You’ll also get insight on how to develop a consistent endpoint security strategy that works for all of your end users, no matter what their roles or applications.

How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC
Date: Dec 10, 2019

View archived webinar

Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.

In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.

Cloud Sprawl: Its Worse Than You Think
Date: Dec 05, 2019

View archived webinar

Organizations today are blind to how many assets they have in the cloud. Many assume they're only in the three major cloud providers (Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure). But in practice, most organizations are in ten or more providers. And if you don’t know about all of your cloud instances, you can’t secure them appropriately. Join us on December 5th to learn how to get complete visibility into your cloud infrastructure with the Expanse Internet Operations Management Platform and reduce your cloud attack surface.

Know Thyself: Cyber Threat Intelligence Gathering Inside Your Organization
Date: Dec 04, 2019

View archived webinar

Some of the most important threat intelligence resides right inside your own organization. What can you learn by taking a closer look at your SIEM, internal telemetry, user lists, and other sources?

In this webinar, learn about the tools that can help your internal threat intelligence gathering and how these efforts could help you detect attackers’ lateral movement, disrupt ransomware and protect endpoint devices.

Enterprise IoT: Rise of the Unmanaged Devices
Date: Dec 03, 2019

View archived webinar

By 2021, up to 90% of devices in businesses will be unmanaged and IoT devices - with no security. Which is why attacks on these devices are up 300% in 2019 alone.

Join Armis, the leading enterprise IoT security company, along with IBM Security Services, to see real-life scenarios of these new unmanaged devices - from enterprise to healthcare to manufacturing.

Defeating Advanced Adversaries with Tactical Analytics
Date: Nov 19, 2019

View archived webinar

In this webinar, you will see how tactical analytics (the main pillar of SOC 3.0) can be set up and used to greatly enhance an organization's security posture against advanced adversaries.

It is a known fact that the traditional reactive defense model is both ineffective and obsolete. The sophisticated techniques, tactics and procedures of modern adversaries necessitate that organizations adopt a proactive defense model and transition to SOC 3.0 operations to be better protected. In this webinar, you will be provided with a clear and technical plan on how to transition to SOC 3.0 and, most importantly, on how to establish a tactical analytics capability to effectively detect and defeat advanced adversaries.

Building a Security Culture
Date: Nov 14, 2019

View archived webinar

Most successful cyber security incidents involve a human at your business -- being manipulated, making an honest mistake, or deliberately taking malicious action. So to defend your organization from any cyber threat, all your users must be ever-vigilant: from your app developers to your accountants, from the CEO to the interns. So how do you build a business-wide culture that values security? How do you not only properly educate users on the threats, but make them care about them? In this webinar, learn the elements of a security culture, how to build one at your organization, and how to know it’s working.

Strategies for Protecting Mission-Critical Data
Date: Nov 06, 2019

View archived webinar

Whether it’s customer lists, intellectual property, or a secret recipe, your mission-critical data is what makes your organization unique – the lifeblood of your enterprise. Yet, with one shrewd exploit, an online attacker – or even one of your own employees – could break the security of that critical information. What steps should you be taking to protect it?

Strategies For Protecting Mission-Critical Data, a free, all-day online conference produced by the editors of Dark Reading, offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. You’ll get insight on how to store critical information securely, and how to ensure its security when it is passed across networks. Top security experts will discuss data encryption strategies, on-premises infrastructure defenses, and how to protect mission-critical data across cloud services, network providers, and partner/supplier environments. You’ll get expert viewpoints and recommendations on how to protect your mission-critical data, and advice on how to identify and protect sensitive data that might be handled outside the IT department’s knowledge or control.

Among the topics that will be covered at Strategies for Protecting Mission-Critical Data:

  • Processes and best practices for identifying sensitive data across the enterprise
  • Tips and tools for ensuring that even “trusted users” cannot access or exfiltrate important data without authorization
  • The latest technologies and strategies for protecting on-premises infrastructure, including networks, servers, and storage systems
  • Strategies for encrypting sensitive information, both in storage and in motion across networks
  • Methods for ensuring that business partners handle sensitive information as securely as your own users
  • Recommendations for working with cloud operators and other service providers to ensure the security of data traveling across their networks
  • Special steps you can take to provide extra protection for your most essential data and information

If you want to know more about the available tools and best practices for protecting mission-critical data from cyberattack – and get some help choosing the right methods and technologies for your own organization -- then this virtual event is for you. Register today!

Strategies for Protecting Mission-Critical Data
Date: Nov 06, 2019

View archived webinar

Whether it’s customer lists, intellectual property, or a secret recipe, your mission-critical data is what makes your organization unique – the lifeblood of your enterprise. Yet, with one shrewd exploit, an online attacker – or even one of your own employees – could break the security of that critical information. What steps should you be taking to protect it?

Strategies For Protecting Mission-Critical Data, a free, all-day online conference produced by the editors of Dark Reading, offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. You’ll get insight on how to store critical information securely, and how to ensure its security when it is passed across networks. Top security experts will discuss data encryption strategies, on-premises infrastructure defenses, and how to protect mission-critical data across cloud services, network providers, and partner/supplier environments. You’ll get expert viewpoints and recommendations on how to protect your mission-critical data, and advice on how to identify and protect sensitive data that might be handled outside the IT department’s knowledge or control.

Implementing an Effective Defense Against Ransomware
Date: Nov 05, 2019

View archived webinar

Ransomware has become one of the fastest-growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar will answer these questions and more, providing expert advice on how to stop ransomware from infecting your critical systems and data --and what to do if your defenses fail.

Building a Better IT Security Architecture for Your Enterprise
Date: Oct 23, 2019

View archived webinar

Many enterprises invest heavily in specialized cyber defense technology -- but unless they also understand the business they are trying to defend, they will continue to fall prey to attackers. How can a security department find all the business's IT assets, prioritize the business's most valuable data, and develop cybersecurity strategies to defend those assets accordingly? How can a SOC be as quick to fix vulnerabilities as it is to find them them? How can a CISO be sure that they have built a cost-effective security architecture that still meets the needs of their organization? In this webinar, attendees will learn to build an overarching security architecture that is built on a stronger foundation and better anticipates the potential threats to your organization.

Creating and Maintaining Effective Metrics for Assessing Enterprise Security
Date: Oct 15, 2019

View archived webinar

When IT security leaders speak with top management, they're typically asked two questions:

  1. How safe is the organization from cyber threats
  2. How well are enterprise defenses working

During this webinar, top experts will discuss key metrics for assessing security posture, as well as the performance of the security team. You'll learn about some useful ways to measure cybersecurity effectiveness, and how to use those metrics to demonstrate new risks as well as the ongoing performance of your security initiatives.

Cyber Resilience: How To Survive A Cyber Attack and Recover Faster
Date: Oct 10, 2019

View archived webinar

For your business to survive a security incident, it needs to get back to doing business as soon as possible --back to serving customers, cutting paychecks, and running production lines. If your organization were hit by a major incident, how badly would your operations be interrupted and how many customers would you lose for good? In this webinar, learn how to prepare today, to make your business more resilient to cyber attacks tomorrow.

Future-Proofing Your Next-Generation Firewall
Date: Oct 09, 2019

View archived webinar

The Next-Generation Firewall (NGFW) has been the cornerstone of enterprise network security for more than a decade. With the onset of digital transformation -- such as mobility, cloud computing, and software-defined networking – one might conclude that the relevance of NGFW would be waning. However, that couldn't be further from the truth.

NGFW is transforming and is becoming increasingly crucial to the success of enterprise cybersecurity programs. Not only is the NGFW providing more functionality in more places and in more form factors than ever before, but it is also enabling vital integration and orchestration capabilities to foster the holistic, best-of-breed network security architectures enterprises demand.

Attend this Dark Reading webinar and hear as Ovum Senior Analyst Eric Parizo and a special guest from Cisco Security discuss the fundamental capabilities of an emerging "new" generation of NGFW platforms, and how enterprises can benefit from the NGFW technological and market evolution.

10 Incredible Ways to Hack Email & How to Stop the Bad Guys
Date: Sep 24, 2019

View archived webinar

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat - a (pre-recorded) hacking demo by Kevin Mitnick. If all you were worried about were phishing attempts, think again!

How to Use Artificial Intelligence and Machine Learning to Improve Enterprise Security
Date: Sep 18, 2019

View archived webinar

Many cybersecurity vendors today use terms such as “AI” and “machine learning” to describe the capabilities of their products. But what exactly do these technologies do, and how can you implement them to improve your everyday IT security processes? In this enlightening Dark Reading webinar, a top expert will offer some useful definitions of terms, and discuss practical applications that could speed your incident response time and improve your use of IT security staff resources

AI vs. AI: The Good, the Bad and the Ugly
Date: Sep 10, 2019

View archived webinar

Think about what would happen when hackers start using the power of AI for their malicious ends? With the dissemination of AI knowledge and resources, this has become not a theoretical question of if, but when. In this webinar we’ll be drawing out the implications of this, as we explore the three possible types of attack which include:

  • AI based attacks – where malware is built on AI algorithms as an integral part of its business logic.
  • AI based attack infrastructure and frameworks – where the AI is used elsewhere in the attacker’s environment and infrastructure, for e.g. server malware creation process etc.
  • Adversarial attacks – where “malicious” AI algorithms work to subvert the functionality of “benign” AI algorithms.
Container Security: How to Protect Your Production Environment from the Threats
Date: Sep 05, 2019

View archived webinar

Many organizations are implementing “containerization” strategies in order to speed application development, make deployment more efficient, and improve scalability. But the rapid growth of containers also has opened up new doors for the bad guys, who are increasingly finding vulnerabilities in hastily created containers and taking advantage of a shortage of container security solutions.

In this Dark Reading webinar, experts offer a comprehensive look at the security flaws and vulnerabilities inherent in many container environments and offer tips and recommendations on how you can detect and remediate those issues prior to deployment – before attackers get a chance to exploit them.

Vendor ATT&CK Misdirection and How to Avoid It
Date: Aug 29, 2019

View archived webinar

Every vendor is talking about ATT&CK but do you know your execution from your exfiltration? Your persistence from privilege escalation? In this webinar, you will learn how a simple shift to an adversary-focused approach will help stop targeted threats and will evolve your security program from lean-back to lean-forward – no matter the size or maturity of your security team.

10 Emerging Threats to Enterprise Applications
Date: Aug 27, 2019

View archived webinar

Cyberattacks to today’s enterprises often begin by exploiting a new or recently discovered software vulnerability. What are some of these emerging application vulnerabilities, and how are attackers using them to crack security and expose critical business data?

In this Dark Reading webinar, application security experts offer a look at some of the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft. The experts also offer some practical advice on how to identify these threats and vulnerabilities in your organization – and how to secure your applications to limit the impact of an application-focused attack.

DDoS Resilience, Remediation and Recovery: Updating Your Strategy
Date: Aug 13, 2019

View archived webinar

Most organizations keep back-ups and have basic plans to protect themselves from denial of service attacks. However, most of those DDoS response strategies were long before businesses relied upon cloud services for fundamental operations, before our environments were full of IoT devices requiring network access, and long before the threat of IoT botnets. We are more reliant than ever on network access, and attackers have more powerful tools than ever to cut that access off.

So are you ready for a DDoS attack on your network -- or on your service provider’s network – or is it time to update your resilience, remediation and recovery plan? In this webinar, learn strategies that will make your business resilient against the DDoS threats of today.

The Cost of Industrial Cyber Incidents and How to Prevent Them
Date: Jul 30, 2019

View archived webinar

Cyberattacks can cause devastating business disruptions and lead to financial losses reaching hundreds of millions of dollars. The World Economic Forum’s 2019 Global Risk Report ranked cyberattacks causing disruption to operations and critical infrastructure among the top five global risks.

The increasing digital connectivity of industrial networks opens them up to cyber threats, underscoring the importance of protecting not just IT systems, but also operational technology (OT) systems. So what are these risks and how do you protect your organization from falling victim to them?

Improving Enterprise Authentication: Taming the Password Beast
Date: Jul 25, 2019

View archived webinar

Many enterprises have implemented some basic methods for managing user authentication to sensitive data, and some have even mastered the “single sign-on” problem for data access. But today’s IT environment increasingly involves a wide range of user devices and locations, including mobile equipment, cloud services, and even Internet of Things devices. In this Dark Reading webinar, top experts will discuss emerging methods for solving the authentication problem, and for building authentication strategies that go beyond the enterprise premises.

Using Network Segmentation and Microsegmentation to Improve Enterprise Defense
Date: Jul 16, 2019

View archived webinar

When an online attacker penetrates your cyber defenses, he or she may take on the guise of an authorized user, making it possible to move laterally within your IT environment to steal information without detection. One growing strategy for limiting this lateral movement is network segmentation, which can restrict access to critical systems and help limit the damage caused by an online attacker. In this Dark Reading webinar, experts discuss methods for using network segmentation and microsegmentation as part of your organization's strategy for limiting the effects of an online compromise.

What to Do When Hackers Attack
Date: Jun 26, 2019

View archived webinar

The worst has happened. Online attackers have penetrated your cyber defenses and are threatening your most sensitive data. What should you do now? In this fascinating and educational virtual event, you will hear advice and recommendations from some of the cybersecurity industry’s top experts and speakers on the critical issues of breach investigation and incident response.

This all-day online conference, produced by the editors of Dark Reading, will help you and your organization prepare for those “very bad days” when you suspect that your mission-critical data has been compromised. Attend the event and you’ll hear about tools and best practices for detecting a breach – even when it’s well-obfuscated – and how to analyze multiple indications of compromise to reveal a sophisticated attack. You’ll also receive first-hand expertise on what to do in the first hours of a major breach, whether to pull the plug on infected systems, and when to call in law enforcement. Best of all, you’ll get expert advice on how to determine the extent of a data compromise, how to stop it, how to remediate your systems, and how to handle legal and business consequences that may follow.

2019 Trends Report: The Zero Trust Journey
Date: Jun 20, 2019

View archived webinar

As your workforce becomes more distributed, security is even more critical. Protecting the network is important but it’s no longer enough to secure applications and data. That’s why adoption of a Zero Trust security framework is on the rise.

Interested in more data on how your peers are adopting Zero Trust to protect their apps, data and distributed workforce?

Automating Cybersecurity Functions in Your Enterprise
Date: Jun 12, 2019

View archived webinar

Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response teams. While the promise of orchestration is great, achieving success requires great care in choosing which processes and investigative actions to automate.

Thinking Like a Cyber Attacker: Strategies for Defense
Date: Jun 06, 2019

View archived webinar

Increasingly, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.

Becoming a Threat Hunter in Your Enterprise
Date: May 14, 2019

View archived webinar

For years, most IT security organizations have waited to detect new threats and  then moved swiftly to defend against them. Today, however, there is a new wave  of “threat hunting,” in which the security team takes a more proactive approach --seeking out potential threats before the attackers have a chance to act. How do enterprises build threat hunting programs? How do they staff them, and what tools do they need? What skills and training does a great threat hunter need? In  this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.

The CISO Challenge
Date: May 09, 2019

View archived webinar

New research highlights key management and communication issues facing those responsible for cyber security, including entrenched perceptions by senior leadership and employees. Nearly 50% of cyber security professionals, for example, believe executive boards see them in just a maintenance role, rather than a source of innovation that contributes to the business. Given the enormous impact of security breaches and the increase in compliance requirements, CISOs need to communicate the value of cyber security across all levels of their organizations.

Join Chief Security Scientist, Joseph Carson as he discusses the changes cyber security professionals must make in order to expand their influence and align cyber security with business priorities so executive boards can see the business case for security investments.

Building an Incident Readiness and Response Playbook
Date: May 08, 2019

View archived webinar

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident readiness and response playbook.

Developing the Right Strategy for Secure Email
Date: May 01, 2019

View archived webinar

Many of today's most damaging cyber attacks begin with a simple hack of the corporate email system. Yet many enterprises still don't have a unified approach to protecting their email and messaging systems, leaving themselves open to a wide range of online exploits. In this webinar, top experts discuss strategies for limiting access to critical email systems, when to encrypt email attachments and transmissions, and how to build a day-to-day process for protecting email against common cyber attacks.

End-User Security Awareness Programs That Work
Date: Apr 30, 2019

View archived webinar

Most successful cyber-attacks begin by manipulating an end user, via a phishing message or other social engineering attack. Instead of just being weak spots, imagine your users could be the security department's eyes and ears--the first to alert you to a potential threat. End users can only help, though, if you give them training that both educates them and makes them care about security. In this webinar learn how to create an end-user security awareness program that engages your users, builds a security culture, and reduces attackers' success rate.

A Day in the Life of an OT Cybersecurity Expert
Date: Apr 17, 2019

View archived webinar

What are the critical must-haves and pitfalls to avoid when it comes to safeguarding industrial facilities in the age of the Industrial Internet of Things? Threats to the safety and security of critical infrastructure make headlines on a regular basis. CISOs and their IT teams may be ultimately accountable for the security of industrial control systems in critical industries such as oil and gas, refining, chemical processing and power generation, but they can benefit greatly from the expertise of their operation technology (OT) cybersecurity teams.

Join us for a panel discussion with three OT cybersecurity experts who share their experience and lessons learned when securing the critical infrastructure. We’ll dive into critical success factors for effectively managing OT risk while ensuring safe and reliable production within the plant.

Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11509
PUBLISHED: 2020-04-07
An XSS vulnerability in the WP Lead Plus X plugin through 0.98 for WordPress allows remote attackers to upload page templates containing arbitrary JavaScript via the c37_wpl_import_template admin-post action (which will execute in an administrator's browser if the template is used to create a page).
CVE-2020-6647
PUBLISHED: 2020-04-07
An improper neutralization of input vulnerability in the dashboard of FortiADC may allow an authenticated attacker to perform a cross site scripting attack (XSS) via the name parameter.
CVE-2020-9286
PUBLISHED: 2020-04-07
An improper authorization vulnerability in FortiADC may allow a remote authenticated user with low privileges to perform certain actions such as rebooting the system.
CVE-2020-11508
PUBLISHED: 2020-04-07
An XSS vulnerability in the WP Lead Plus X plugin through 0.98 for WordPress allows logged-in users with minimal permissions to create or replace existing pages with a malicious page containing arbitrary JavaScript via the wp_ajax_core37_lp_save_page (aka core37_lp_save_page) AJAX action.
CVE-2013-7488
PUBLISHED: 2020-04-07
perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.