Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Compliance posted in July 2009
'MonkeyFist' Launches Dynamic CSRF Web Attacks
News  |  7/30/2009  | 
Researchers release tool that automates cross-site request forgery attacks
Exploits Take Advantage Of Hot News, Search Queries
Quick Hits  |  7/28/2009  | 
Attackers look to attach their malware to hot Google searches, report says
Two Newly Disclosed Hacks Prey On Browser, Web Security
News  |  7/20/2009  | 
New cross-site request forgery (CSRF) proof-of-concept and Firefox 3.5 hacking tool released
Least-Privilege Technology Still Swimming Upstream, But Making Progress
News  |  7/10/2009  | 
Fundamental shift in endpoint security might be easier with rollout of Windows 7, experts say
Research: A Day In the Life of A Spamming Bot
Quick Hits  |  7/9/2009  | 
ESET researchers discover that a Waledac-infected bot spams out 150,000 messages a day
Oracle Report: Consumers Fickle About Ecommerce Security Controls
Quick Hits  |  7/7/2009  | 
Nearly one-third of U.K.'s online shoppers don't trust online security measures, but most don't want additional controls if it affects ease and speed of transactions
New Tool And Managed Service 'Penetration-Test' End Users
News  |  7/6/2009  | 
New User Attack Framework (UAF) could eventually work with Metasploit's hacking tool, researchers say


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.