var _hmt = _hmt || []; (function() { var hm = document.createElement("script"); hm.src = "https://hm.baidu.com/hm.js?d387e539c1f2d34f09a9afbac8032280"; var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(hm, s); })();

7x彩票网appDark Reading is part of the Informa Tech Division of Informa PLC

7x彩票网appThis site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

News & Commentary
AWS Issues 'Urgent' Warning for Database Users to Update Certs
Dark Reading Staff, Quick Hits
Users of AWS Aurora, DocumentDB, and RDS databases must download and install a fresh certificate and rotate the certificate authority.
By Dark Reading Staff , 1/9/2020
Comment0 comments  |  Read  |  Post a Comment
Google's Project Zero Policy Change Mandates 90-Day Disclosure
Dark Reading Staff, Quick Hits
The updated disclosure policy aims to achieve more thorough and improved patch development, Google reports.
By Dark Reading Staff , 1/8/2020
Comment1 Comment  |  Read  |  Post a Comment
The "Art of Cloud War" for Business-Critical Data
Greg Jensen, Senior Director of Security at Oracle CorporationCommentary
How business executives' best intentions may be negatively affecting security and risk mitigation strategies -- and exposing weaknesses in organizational defenses.
By Greg Jensen Senior Director of Security at Oracle Corporation, 1/8/2020
Comment0 comments  |  Read  |  Post a Comment
Cloudflare Adds New Endpoint, Web Security Service
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
"Teams" and a new browser security acquisition expand the cloud firm's security offerings.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/7/2020
Comment0 comments  |  Read  |  Post a Comment
Mimecast Acquires Segasec to Boost Phishing Defense
Dark Reading Staff, Quick Hits
Segasec's technology will be integrated into Mimecast's email and Web security services to identify malicious domains.
By Dark Reading Staff , 1/6/2020
Comment0 comments  |  Read  |  Post a Comment
Continental Drift: Is Digital Sovereignty Splitting Global Data Centers?
Dark Reading Staff, News
The recent proposal by Germany, backed by France, to fuse the infrastructures of Europe's cloud providers could challenge every data center storing a European's data.
By Special to Dark Reading: Scott Fulton III, Data Center Knowledge , 1/3/2020
Comment0 comments  |  Read  |  Post a Comment
Organizations May 'Uncloud' Over Security, Budgetary Concerns
Matt Middleton-Leal, General Manager and Chief Security Strategist, NetwrixCommentary
While most cloud vendors forecast continued adoption and growth, some customers are taking a harder look at the cloud services they're using
By Matt Middleton-Leal General Manager and Chief Security Strategist, Netwrix, 1/3/2020
Comment0 comments  |  Read  |  Post a Comment
20 Vulnerabilities to Prioritize Patching Before 2020
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers list the top 20 vulnerabilities currently exploited by attack groups around the world.
By Kelly Sheridan Staff Editor, Dark Reading, 12/23/2019
Comment0 comments  |  Read  |  Post a Comment
F5 Pays $1 Billion for Shape
Dark Reading Staff, Quick Hits
The acquisition adds fraud detection and prevention to the application delivery company's tool collection.
By Dark Reading Staff , 12/20/2019
Comment0 comments  |  Read  |  Post a Comment
Google Cloud External Key Manager Now in Beta
Dark Reading Staff, Quick Hits
Cloud EKM is designed to separate data at rest from encryption keys stored in a third-party management system.
By Dark Reading Staff , 12/19/2019
Comment0 comments  |  Read  |  Post a Comment
Trading Online? Steps to Take to Avoid Getting Phished
Sam Bocetta, Security AnalystNews
From an IT manager?s perspective, any employee using such a mobile app on a phone they also use for business opens up risks to the corporate network.
By Special to Dark Reading: Sam Bocetta, Network Computing , 12/18/2019
Comment0 comments  |  Read  |  Post a Comment
'Password' Falls in the Ranks of Favorite Bad Passwords
Kelly Sheridan, Staff Editor, Dark ReadingNews
7x彩票网app, Google named worst password breach offenders.
By Kelly Sheridan Staff Editor, Dark Reading, 12/18/2019
Comment0 comments  |  Read  |  Post a Comment
Higher Degree, Higher Salary? Not for Some Security Pros
Kelly Sheridan, Staff Editor, Dark ReadingNews
Turns out, skill beats experience and an academic degree doesn't guarantee higher compensation for five security positions.
By Kelly Sheridan Staff Editor, Dark Reading, 12/17/2019
Comment0 comments  |  Read  |  Post a Comment
Data Security Startup Satori Cyber Launches with $5.25M Seed Round
Kelly Sheridan, Staff Editor, Dark ReadingNews
Satori Cyber aims to help businesses better protect and govern their information with its Secure Data Access Cloud.
By Kelly Sheridan Staff Editor, Dark Reading, 12/17/2019
Comment0 comments  |  Read  |  Post a Comment
Fortinet Buys CyberSponse for SOAR Capabilities
Dark Reading Staff, Quick Hits
It plans to integrate CyberSponse's SOAR platform into the Fortinet Security Fabric.
By Dark Reading Staff , 12/13/2019
Comment0 comments  |  Read  |  Post a Comment
Endpoint Protection: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
Trojans, knights, and medieval wordplay. And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 12/13/2019
Comment0 comments  |  Read  |  Post a Comment
Lessons Learned from 7 Big Breaches in 2019
Jai Vijayan, Contributing Writer
Capital One, Macy's, FEMA, and others: key takeaways from the year's most notable breaches.
By Jai Vijayan Contributing Writer, 12/13/2019
Comment2 comments  |  Read  |  Post a Comment
Smart Building Security Awareness Grows
Dark Reading Staff, News
In 2020, expect to hear more about smart building security.
By Special to Dark Reading: Brian Buntz, IoT World Today , 12/12/2019
Comment0 comments  |  Read  |  Post a Comment
Big Changes Are Coming to Security Analytics & Operations
Jon Oltsik, Senior Principal Analyst & Fellow, Enterprise Strategy GroupCommentary
New ESG research points to fundamental problems, a need for scalable security data pipelines, and a migration to the public cloud.
By Jon Oltsik Senior Principal Analyst & Fellow, Enterprise Strategy Group, 12/11/2019
Comment1 Comment  |  Read  |  Post a Comment
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/10/2019
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Widely Known Flaw in Pulse Secure VPN Being Used in Ransomware Attacks
Jai Vijayan, Contributing Writer,  1/6/2020
7 Free Tools for Better Visibility Into Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  1/9/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
7x彩票网app Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database

PUBLISHED: 2020-01-09
LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.

PUBLISHED: 2020-01-09
A mutation cross-site scripting (XSS) issue in Typora through 0.9.9.31.2 on macOS and through 0.9.81 on Linux leads to Remote Code Execution through Mermaid code blocks. To exploit this vulnerability, one must open a file in Typora. The XSS vulnerability is then triggered due to improper HTML saniti...

PUBLISHED: 2020-01-09
languageOptions.php in Rasilient PixelStor 5000 K:4.0.1580-20150629 (KDI Version) allows unauthenticated attackers to remotely execute code via the lang parameter.

PUBLISHED: 2020-01-09
contentHostProperties.php in Rasilient PixelStor 5000 K:4.0.1580-20150629 (KDI Version) allows authenticated attackers to remotely execute code via the name parameter.

PUBLISHED: 2020-01-09
A cross-site scripting (XSS) vulnerability in Option/optionsAll.php in Rasilient PixelStor 5000 K:4.0.1580-20150629 (KDI Version) allows remote attackers to inject arbitrary web script or HTML via the ContentFrame parameter.
66?????? 7072???? 7073???? 689????? 963???? 66????? 7073???? 7073???? 66???app 8????app