Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinar Archives

Upcoming Webinars
Ten Keys to Better Security Data Analysis
Date: Mar 03, 2021

View archived webinar

If you’re swimming in security incident data, alerts, and log files, you’re not alone. How can you aggregate that data and analyze it quickly, to identify sophisticated or obfuscated attacks? In this webinar, experts discuss ways to effectively collect and analyze large amounts of security data, enabling you to surface the threat and exploit information that you need to defend your enterprise. Speakers will also offer recommendations on how to automate some of that data analysis, so that you can identify threats more easily, and stop attackers more quickly.

How Elite Analyst Teams are Transforming Security with Threat Reconnaissance
Date: Feb 24, 2021

View archived webinar

Recent high profile Advanced persistent threat (APT) breaches have highlighted not only the need to see your whole attack surface from the attackers’ perspectives, but the need to get ahead of these threats by monitoring threat actor infrastructures as they evolve.

Organizations in a variety of high-risk industries continually face sophisticated threat actors, and many have fundamentally changed their organizations’ approach to security by implementing forward-leaning threat reconnaissance programs.

In this webinar, we will look at case studies from consumer banks and big retail to illustrate how these organizations are leveraging their analyst teams in more strategic ways to vastly improve their security postures. Learn how these organizations are getting the upper hand on high-criticality threats by tracing, mapping and monitoring the infrastructures of their high priority adversaries.

Protecting Your Enterprise's Intellectual Property
Date: Feb 17, 2021

View archived webinar

Cyber attackers can scrape by stealing personal information and credentials, but the “big score” is intellectual property theft. Attacks on IP require a level of sophistication that most enterprises have never encountered before – is your cybersecurity team ready to face them? In this webinar, you’ll learn about the techniques and tactics that cybercriminals use to crack IP, and how your organization can detect and defend itself against these sophisticated, targeted attacks. 

Building the SOC of the Future: Next-Generation Security Operations
Date: Feb 11, 2021

View archived webinar

No matter what your industry, your organization’s size, or the number of work-from-home staff you have, there is a growing need to monitor your systems for potential threats – and have the capacity to respond quickly in the event of a compromise. To build out this capacity, many enterprises are building or expanding their security operations centers (SOCs) to improve their ability to detect and respond to cyber threats. In this webinar, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today’s most current threats and online exploits.

Securing and Monitoring Networks in the 'New Normal'
Date: Feb 10, 2021

View archived webinar

As the smoke clears from the COVID-19 crisis, one thing is clear: the enterprise network will never be the same. Many end users have discovered that they like working from home, and they’re planning to continue. Many former brick-and-mortar business models have become digital, and will likely stay that way. And network architectures, and the security architectures that support them, will have to change permanently. In this webinar, top experts discuss methods for re-architecting network and security strategies to ensure that these new worker and business models remain safe and minimize cyber risk. You’ll learn how you can adapt your enterprise’s and security tools and practices to the “new normal,” and how to use these changes to make your corporate data more secure.

Making Cybersecurity Work in Small and Medium-Sized Businesses
Date: Feb 03, 2021

View archived webinar

Small and medium-sized businesses (SMBs) sometimes believe they are too small to be targeted by cyber attackers. In recent years, that idea has been debunked by a wide variety of attacks on SMBs, from simple malware to account takeover. Yet many SMBs cannot take advantage of enterprise security tools and services that are too expensive or complex for their small teams to manage. In this Dark Reading webinar, experts offer tips and recommendations for securing the smaller enterprise, and for implementing simple, affordable tools and best practices that make sense for resource-limited SMB.

Building an Application Security Strategy For the Next Decade
Date: Jan 21, 2021

View archived webinar

For many years, enterprises built their application security strategies around vulnerability scanning and next-generation firewalls. But with the advent of DevOps, ShiftLeft, and many other application development tools and strategies, yesterday’s strategies will no longer work for the enterprises of the 2020s. In this webinar, experts offer a look at emerging technologies and trends in application development, and the role that security will play in tomorrow’s software development lifecycle. You’ll also get insight on how to detect and remediate vulnerabilities in off-the-shelf applications, and how to identify and root out vulnerabilities in open source code.

A Radical Approach to Threat Intel Management
Date: Jan 20, 2021

View archived webinar

For years, cyber threat intelligence has been focused on collecting tactical Indicators of Compromise (IOCs) such as domains, IP addresses, & hashes. But what's the point of collecting tactical information that your team can't act on or map to what's happening in your environment?

As a security leader, you need more from your cyber threat intelligence program.

Putting the Secs Into SecDevOps
Date: Jan 13, 2021

View archived webinar

DevOps practices and technologies have changed the way software is developed, written, and run. But how does your application development team build security into its processes? In this webinar, experts discuss the integration of security and DevOps – sometimes called SecDevOps or DevSecOps – and how it can make your applications not only more flexible, but more secure. You’ll also get advice on how to bring your security team and app dev team together through common tools and practices that foster secure code development.

Getting Your Security Tech Together: Making Orchestration and Automation Work For Your Enterprise
Date: Jan 07, 2021

View archived webinar

If your IT shop is like most enterprises’, you’ve got a ton of tools and processes – but no easy way to tie them together and automate them. How can you pull your existing security systems together to improve your data defenses and speed incident response? 

Architecting Security for the Internet of Things
Date: Dec 16, 2020

View archived webinar

As the Internet of Things (IoT) becomes a broader reality in business, IT and security professionals are being challenged to find ways to secure Internet-enabled technology in all types of non-computer devices. How can an enterprise IT department develop and manage an effective security strategy for IoT technology? In this webcast, experts discuss the most effective approaches to securing the embedded systems used in their enterprise and offer advice on monitoring and protecting next-generation IoT technology.

The Pesky Password Problem: Policies That Help You Gain the Upper Hand on the Bad Guys
Date: Dec 15, 2020

View archived webinar

What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?

For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries’ inability to engineer secure systems. Password complexity, length, and rotation requirements are the bane of your end-user experience and literally the cause of thousands of data breaches. But it doesn't have to be that way!

Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, to find out what your password policy should be and learn about the common mistakes organizations make when creating password policy.

Defense and Response Against Insider Threats & User Errors
Date: Dec 10, 2020

View archived webinar

Your cybersecurity team  has a strategy for preventing hackers from cracking critical systems and data from the outside. But do you have a clear strategy for preventing internal leaks, whether malicious or accidental? And do you have a plan for responding to suspected leaks?  In this webinar, industry experts will discuss the key strategies, processes, and technologies that enterprises need to mitigate the most damaging data breaches of all -- the ones created by trusted users.

Unlocking the Ultimate Source of Truth in Cloud SecurityNetwork Data
Date: Nov 19, 2020

View archived webinar

Learn how virtual taps from AWS, Azure, and Google Cloud enable network detection and response (NDR) solutions to help secure cloud environments with agentless and immutable monitoring and threat detection capabilities. Invisible to attackers, NDR solutions sit out of band and analyze network traffic streams to provide crucial information about devices, users, and potential attacks that other security tools simply can’t. Best-of-breed NDR also augments security personnel visibility into SSL/TLS 1.3 encrypted traffic and ML-driven threat detection that alerts only on items that matter while providing intelligence to remediation and forensic workflows.

Cyber Attackers Favorite Exploits and How to Stop Them
Date: Nov 12, 2020

View archived webinar

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Cyber Attackers’ Favorite Exploits – And How to Stop Them -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered at Cyber Attackers’ Favorite Exploits: And How to Stop Them:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
  • Details on some of the simplest and most common tricks for cracking enterprise systems and networks
  • Methods for recognizing and mitigating frequently-used online cyber exploits
  • Advice on how to use threat intelligence to prevent trending attacks
  • A look at emerging methods to frustrate and deceive online attackers
  • Recommendations on how to analyze information on emerging exploits, and how to develop a response plan

 

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them -- then this virtual event is for you.

Cyber Attackers Favorite Exploits and How to Stop Them
Date: Nov 12, 2020

View archived webinar

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Cyber Attackers’ Favorite Exploits – And How to Stop Them -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered at Cyber Attackers’ Favorite Exploits: And How to Stop Them:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
  • Details on some of the simplest and most common tricks for cracking enterprise systems and networks
  • Methods for recognizing and mitigating frequently-used online cyber exploits
  • Advice on how to use threat intelligence to prevent trending attacks
  • A look at emerging methods to frustrate and deceive online attackers
  • Recommendations on how to analyze information on emerging exploits, and how to develop a response plan

 

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them -- then this virtual event is for you.

Cyber Attackers Favorite Exploits And How to Stop Them
Date: Nov 12, 2020

View archived webinar

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Cyber Attackers’ Favorite Exploits – And How to Stop Them -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered at Cyber Attackers’ Favorite Exploits: And How to Stop Them:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
  • Details on some of the simplest and most common tricks for cracking enterprise systems and networks
  • Methods for recognizing and mitigating frequently-used online cyber exploits
  • Advice on how to use threat intelligence to prevent trending attacks
  • A look at emerging methods to frustrate and deceive online attackers
  • Recommendations on how to analyze information on emerging exploits, and how to develop a response plan

 

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them -- then this virtual event is for you. Register today!

SecDevOps: Tying Security to Your Application Development Processes
Date: Nov 11, 2020

View archived webinar

For many application development teams, the concept of DevOps is changing the way software is developed, written, and run. But how does your app dev team build security into its processes? In this webinar, experts discuss the integration of security and DevOps – sometimes called SecDevOps or DevSecOps – and how it can make your applications not only more flexible, but more secure. You’ll also get advice on how to bring your security team and app dev team together through common tools and practices that foster secure code development.

Using Artificial Intelligence, Deep Learning and Machine Learning for Cyber Defense
Date: Nov 03, 2020

View archived webinar

A new wave of machine learning, deep learning, and artificial intelligence technology promises to help IT security operations teams detect cyber threats sooner and respond to them more quickly. But machine learning is used in a wide variety of ways, and not all machine learning-based products work in the same fashion. In this webinar, experts will discuss the ways that these technologies can help in security operations, how they can speed threat analysis, and how to evaluate and choose technologies that will work in your organization.

The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You
Date: Oct 20, 2020

View archived webinar

With malware attacks on the rise, making sure you keep your organization safe from a costly breach is a top priority. The two best things you can do to stop malware and ransomware attacks are to figure out how malware is getting by your defenses and for how long. Your current antivirus vendor isn't going to tell you the answers to either of these. But Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, will.

Join him as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about.

Stop playing reactive defense. Go on the offensive! Use your existing data to craft a better malware defense today.

Automating Security Functions in Your Enterprise
Date: Oct 15, 2020

View archived webinar

A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? How does emerging automation technology work, and how can security teams implement it in a way that is both effective and secure? In this webinar, top experts offer insights on how to make automation work for your security team.

Effective Cyber Risk Assessment and Measurement
Date: Oct 06, 2020

View archived webinar

The perils of security breaches are widely publicized, but do you know exactly how an attack or breach would affect your business? Learn about the costs associated with today’s threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to prioritize costs and defense strategies specifically for your environment.

Effective Cyber Risk Assessment and Measurement
Date: Oct 06, 2020

View archived webinar

The perils of security breaches are widely publicized, but do you know exactly how an attack or breach would affect your business? Learn about the costs associated with today’s threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to prioritize costs and defense strategies specifically for your environment.

Get Your Security Tools Talking for More Effective Incident Response
Date: Sep 24, 2020

View archived webinar

How your team responds to an incident has a tremendous impact on the outcome. But with the average organization using dozens upon dozens of security tools, each with its own alerts, interfaces, and logins, it can be tough to respond to incidents quickly. How do you manage a well-orchestrated, repeatable and effective incident response in the midst of tool chaos and a changing threat landscape? Join this webinar with Jake Gillen, SOAR Engineer, and Julie Rockett, Senior Product Marketing Manager, as they show you what and how to automate within incident response while also making your security toolset more effective.

Get Your Security Tools Talking for More Effective Incident Response
Date: Sep 24, 2020

View archived webinar

How your team responds to an incident has a tremendous impact on the outcome. But with the average organization using dozens upon dozens of security tools, each with its own alerts, interfaces, and logins, it can be tough to respond to incidents quickly. How do you manage a well-orchestrated, repeatable and effective incident response in the midst of tool chaos and a changing threat landscape? Join this webinar with Jake Gillen, SOAR Engineer, and Julie Rockett, Senior Product Marketing Manager, as they show you what and how to automate within incident response while also making your security toolset more effective.

Deception: The Next Step In Cyber Defense
Date: Sep 22, 2020

View archived webinar

All organizations have tools and strategies for keeping attackers out. But what if you could distract and frustrate attackers by making them *think* they’ve gotten your crown jewels? In this webinar, experts discuss emerging tools and strategies for cyber threat deception, which enables you to put your attackers into a juicy-looking, yet bogus environment that keeps them away from your actual data.

Deception: The Next Step In Cyber Defense
Date: Sep 22, 2020

View archived webinar

All organizations have tools and strategies for keeping attackers out. But what if you could distract and frustrate attackers by making them *think* they’ve gotten your crown jewels? In this webinar, experts discuss emerging tools and strategies for cyber threat deception, which enables you to put your attackers into a juicy-looking, yet bogus environment that keeps them away from your actual data.

Implementing an Effective Defense Against Ransomware
Date: Sep 16, 2020

View archived webinar

Ransomware has become one of the fastest-growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar will answer these questions and many more, providing  expert advice on how to stop ransomware from infecting your critical systems and data --and what to do if your defenses fail.

Staffing and Training a Cyber Incident Response Team
Date: Sep 15, 2020

View archived webinar

Today’s enterprises are under attack. Whether it’s malware, ransomware, social engineering, or targeted exploits, security teams must be ready to detect these cyber attacks, analyze the threat, and launch a quick and effective response. Is your organization ready?

There are a wide variety of IT security tools available for cyber incident response. But most organizations have discovered that it’s people – the analysts and technicians who make up the cyber response team – that provide the key knowledge needed to recognize the exploits and instigate critical actions in the event of a cybersecurity incident.

Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?
Date: Aug 18, 2020

View archived webinar

There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

Protecting Mobile Apps and APIs from the Inside Out
Date: Jul 29, 2020

View archived webinar

From mobile banking to telemedicine to ecommerce, consumers are relying on web and mobile apps more than ever before. But as organizations become even more dependent on the revenue these apps generate, most still aren’t doing enough to protect applications against attacks that can compromise data or lead to fraud.

Given the threat surface that applications expose, balancing the need for engaging customer experiences with robustly securing web and mobile applications and their underlying APIs can be a struggle for even the most technologically savvy enterprises.

Red Team Realities
Date: May 28, 2020

View archived webinar

Red Team is an exciting term, but it can be misconstrued. How do you know when it’s the right fit for your organization? Using real-world anecdotes, this webinar will illustrate how to navigate a decision-making process aligned to use cases and desired outcomes tailored to your organization's needs. Listen as we discuss the different levels of cybersecurity assessments, and help you determine which one is right for your organization (hint: it's in the title).

The State of IT and Cybersecurity Operations
Date: May 20, 2020

View archived webinar

As companies tighten their belts, the need for coordination between IT and Cybersecurity Operations has never been more urgent. Now is the time to align organizational priorities and budgets.

Dark Reading recently took a measure of the relationship between IT and Security teams. Join us as we discuss the survey, share it's findings and review best practices for CIOs and other leadership roles.

5 Steps to Integrate SAST into the DevSecOps Pipeline
Date: Apr 29, 2020

View archived webinar

Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t have the resources to perform code reviews and provide remediation guidance on the entire application portfolio. Static analysis, also known as static application security testing (SAST), is an automated way to find bugs, back doors, and other code-based vulnerabilities so the team can mitigate those risks.

Cyber Attack Evasion Techniques
Date: Mar 23, 2020

View archived webinar

When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.

Shaking Off Security Alert Fatigue: Tips for Taking Control
Date: Mar 18, 2020

View archived webinar

Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the snooze button on your alarm clock. How can you manage security alerts so they are most meaningful to your business, and act on them in an appropriate, timely manner? 

Preventing Credential Theft & Account Takeovers
Date: Mar 10, 2020

View archived webinar

Breaches that expose passwords and grant cyber attackers access to privileged user accounts are now so common that users greet the news with more shrugs than shock, and security experts advise to "assume user credentials have been exposed." Yet, these attacks can be as catastrophic as they are commonplace.  Stolen credentials and account takeovers are the footholds cybercriminals use to launch all manner of attacks -- from financial fraud and virtual currency theft, to data breaches and cyber espionage. In this webinar learn how these bread-and-butter cyberattacks work and how to bolster your defenses against them.     

Zero-Trust In Practice
Date: Mar 05, 2020

View archived webinar

Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model – trust nothing, verify everything – is the proposed answer to this problem. But it’s easier said than done in real enterprise. In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you’ll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24913
PUBLISHED: 2021-03-04
A SQL injection vulnerability in qcubed (all versions including 3.1.1) in profile.php via the strQuery parameter allows an unauthenticated attacker to access the database by injecting SQL code via a crafted POST request.
CVE-2020-24914
PUBLISHED: 2021-03-04
A PHP object injection bug in profile.php in qcubed (all versions including 3.1.1) unserializes the untrusted data of the POST-variable "strProfileData" and allows an unauthenticated attacker to execute code via a crafted POST request.
CVE-2020-24036
PUBLISHED: 2021-03-04
PHP object injection in the Ajax endpoint of the backend in ForkCMS below version 5.8.3 allows an authenticated remote user to execute malicious code.
CVE-2020-24912
PUBLISHED: 2021-03-04
A reflected cross-site scripting (XSS) vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users.
CVE-2019-18629
PUBLISHED: 2021-03-04
Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow an attacker to execute an unwanted binary during a exploited clone install. This requires creating a clone file and signing that file with a com...