var _hmt = _hmt || []; (function() { var hm = document.createElement("script"); hm.src = "https://hm.baidu.com/hm.js?d387e539c1f2d34f09a9afbac8032280"; var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(hm, s); })();

7x彩票网appDark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Upcoming Webinars


Date: Apr 29, 2020

Join us as we walk you through the challenges and benefits of integrating a SAST tool into your DevSecOps pipeline and how we've helped other organizations with this process.


Date: Mar 19, 2020

Join us for this webinar in which we will share lessons learned from nine years of working with leading cloud adopters including household names in streaming content, wireless and telecom providers, worldwide gaming networks, financial institutions, and SaaS providers.


Date: Mar 10, 2020

In this webinar, you'll learn where your credentials are most vulnerable to compromise, get a guide through the anatomy of an account takeover attack, and discover tools and techniques to harden your defenses against credential theft and account takeovers.


Date: Mar 05, 2020

In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you'll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.


Date: Feb 19, 2020

In this webinar, experts outline the top ways that attackers are exploiting cloud services, applications and implementations and give advice on how to use the cloud more securely.

5 Measures to Harden Election Technology
Ari Singer, CTO at TrustPhi,  2/7/2020
Researchers Reveal How Smart Lightbulbs Can Be Hacked to Attack
Jai Vijayan, Contributing Writer,  2/6/2020
Keeping a Strong Security Metrics Framework Strong
Joshua 7x彩票网appfarb, Independent Consultant,  2/11/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The secure cloud access project budget got cut.
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
7x彩票网app Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database

PUBLISHED: 2020-02-13
explorer.js in Amazon AWS JavaScript S3 Explorer (aka aws-js-s3-explorer) v2 alpha before 2019-08-02 allows XSS in certain circumstances.

PUBLISHED: 2020-02-13
A stack-based buffer overflow was found on the D-Link DIR-842 REVC with firmware v3.13B09 HOTFIX due to the use of strcpy for 7x彩票网appPASSWORD when handling a POST request to the /MTFWU endpoint.

PUBLISHED: 2020-02-13
OpenVPN Access Server 2.8.x before 2.8.1 allows LDAP authentication bypass (except when a user is enrolled in two-factor authentication).

PUBLISHED: 2020-02-13
TimeTools SC7105 1.0.007, SC9205 1.0.007, SC9705 1.0.007, SR7110 1.0.007, SR9210 1.0.007, SR9750 1.0.007, SR9850 1.0.007, T100 1.0.003, T300 1.0.003, and T550 1.0.003 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the t3.cgi srmodel or srtime parameter.

PUBLISHED: 2020-02-13
TimeTools SC7105 1.0.007, SC9205 1.0.007, SC9705 1.0.007, SR7110 1.0.007, SR9210 1.0.007, SR9750 1.0.007, SR9850 1.0.007, T100 1.0.003, T300 1.0.003, and T550 1.0.003 devices allow remote attackers to bypass authentication by placing t3axs=TiMEtOOlsj7G3xMm52wB in a t3.cgi request, aka a "hardco...
66?????? 7072???? 7073???? 689????? 963???? 66????? 7073???? 7073???? 66???app 8????app