Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Upcoming Webinars

Webinar Archives
Building a Better IT Security Architecture for Your Enterprise
Date: Oct 23, 2019
View webinar
In this Dark Reading webinar, attendees will learn to build an overarching security architecture that is built on a stronger foundation and better anticipates the potential threats to your organization.

Creating and Maintaining Effective Metrics for Assessing Enterprise Security
Date: Oct 15, 2019
View webinar
In this webinar, top experts will discuss key metrics for assessing security posture, as well as the performance of the security team. You'll learn about some useful ways to measure cybersecurity effectiveness, and how to use those metrics to demonstrate new risks as well as the ongoing performance of your security initiatives.

How To Survive A Cyber Attack & Recover Faster
Date: Oct 10, 2019
View webinar
For your business to survive a security incident, it needs to get back to doing business as soon as possible. In this webinar, learn how to prepare today, to make your business more resilient to cyber attacks tomorrow.

How is the Latest Uninterruptible Power Supply (UPS) Technology Designed for Edge and Cloud Computing?
Date: Oct 09, 2019
View webinar
Edge Computing and Cloud are two key pillars of new internet architectures. Thus, you must rethink the infrastructure solutions you deploy to support these environments, specifically Uninterruptible Power Supply (UPS) technologies.

Future-Proofing Your Next-Generation Firewall
Date: Oct 09, 2019
View webinar
Attend this Dark Reading webinar and hear as Ovum Senior Analyst Eric Parizo and a special guest from Cisco Security discuss the fundamental capabilities of an emerging "new" generation of NGFW platforms, and how enterprises can benefit from the NGFW technological and market evolution.

10 Incredible Ways to Hack Email & How to Stop the Bad Guys
Date: Sep 24, 2019
View webinar


Protect next-gen network infrastructure from terabit DDoS attacks
Date: Sep 24, 2019
View webinar
This webinar will detail DDoS mitigation concerns, solutions, and real-world use cases as well as key considerations as we roll out more 100G connections and face the reality of defending terabit+ infrastructures.

Managing IoT security through the endpoint, network, and cloud
Date: Sep 19, 2019
View webinar
This webinar will explore the need for a data security plan that protects all information domains, incorporates comprehensive risk management, and implements regular assessments as threats continue to evolve.

How to Use AI & Machine Learning to Improve Enterprise Security
Date: Sep 18, 2019
View webinar
In this webinar, a top expert will offer some useful definitions of terms, and discuss practical applications that could speed your incident response time and improve your use of IT security staff resources.

AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16317
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...
CVE-2019-16318
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.
CVE-2019-16307
PUBLISHED: 2019-09-14
A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 allows remote attackers to inject arbitrary web script or HTML via the handle parameter (webExMeetingLogin.jsp) and meetingKe...
CVE-2019-16294
PUBLISHED: 2019-09-14
SciLexer.dll in Scintilla in Notepad++ (x64) before 7.7 allows remote code execution or denial of service via Unicode characters in a crafted .ml file.
CVE-2019-16309
PUBLISHED: 2019-09-14
FlameCMS 3.3.5 has SQL injection in account/login.php via accountName.