Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
New Citadel Attack Targets Password Managers
Newest First  |  Oldest First  |  Threaded View
babjipemmadi
babjipemmadi,
User Rank: Apprentice
11/30/2014 | 10:52:49 PM
A testimonial
I must say that overall I am really impressed with this blog.It is easy to see that you are impassioned about you writing.Nice post.i was searching for this post from last 30 minutes on google. and i reach to your website,superbly written and well explained.thanks for your article.looking for other posts also.keep it up.

Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/21/2014 | 1:02:34 PM
Re: Where did I put that Post-It?
It sure does look that way, more and more, @gmerriman112.
gmerriman112
gmerriman112,
User Rank: Strategist
11/21/2014 | 12:07:31 PM
Where did I put that Post-It?
So it looks like keeping a list of passwords on a list tucked away in a desk drawer might be the most secure password safe after all.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/21/2014 | 7:09:30 AM
Keystroke logging malware
This is really proof positive about how sophisticated hackers have gotten in their tactics. Really frightening development.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1399
PUBLISHED: 2022-08-17
An Argument Injection or Modification vulnerability in the "Change Secret" username field as used in the Discovery component of Device42 CMDB allows a local attacker to run arbitrary code on the appliance with root privileges. This issue affects: Device42 CMDB version 18.01.00 and prior ve...
CVE-2022-1400
PUBLISHED: 2022-08-17
Use of Hard-coded Cryptographic Key vulnerability in the WebReportsApi.dll of Exago Web Reports, as used in the Device42 Asset Management Appliance, allows an attacker to leak session IDs and elevate privileges. This issue affects: Device42 CMDB versions prior to 18.01.00.
CVE-2022-1401
PUBLISHED: 2022-08-17
Improper Access Control vulnerability in the /Exago/WrImageResource.adx route as used in Device42 Asset Management Appliance allows an unauthenticated attacker to read sensitive server files with root permissions. This issue affects: Device42 CMDB versions prior to 18.01.00.
CVE-2022-1410
PUBLISHED: 2022-08-17
OS Command Injection vulnerability in the db_optimize component of Device42 Asset Management Appliance allows an authenticated attacker to execute remote code on the device. This issue affects: Device42 CMDB version 18.01.00 and prior versions.
CVE-2021-42052
PUBLISHED: 2022-08-16
IPESA e-Flow 3.3.6 allows path traversal for reading any file within the web root directory via the lib/js/build/STEResource.res path and the R query parameter.