Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dark Reading Article Boards

Message Boards posted in July 2021
7 Hot Cyber Threat Trends to Expect at Black Hat
Last Message: 7/29/2021
 |  Comments: 1
Name That Edge Toon: Security Grill
Last Message: 7/29/2021
 |  Comments: 1
Hacking Group LulzSec Denies Arrest Report
Last Message: 7/23/2021
 |  Comments: 5
US-CERT Warns That HTTPS Inspection Tools Weaken TLS
Last Message: 7/19/2021
 |  Comments: 45
SonicWall: 'Imminent' Ransomware Attack Targets Older Products
Last Message: 7/15/2021
 |  Comments: 1
Kaseya Releases Security Patch As Companies Continue to Recover
Last Message: 7/15/2021
 |  Comments: 3
3 Things Every CISO Wishes You Understood
Last Message: 7/11/2021
 |  Comments: 1
Why Are There Never Enough Logs During an Incident Response?
Last Message: 7/10/2021
 |  Comments: 1
5 Mistakes That Impact a Security Team's Success
Last Message: 7/8/2021
 |  Comments: 1
Watch for Cybersecurity Games at the Tokyo Olympics
Last Message: 7/6/2021
 |  Comments: 1
SMB Worm Targeting EternalBlue Vuln Spreads to US
Last Message: 7/1/2021
 |  Comments: 1
10 Cybersecurity Twitter Profiles To Watch
Last Message: 7/1/2021
 |  Comments: 3

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.