Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
In Brief: Using Offense To Create Best Defense
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
androidblender
50%
50%
androidblender,
User Rank: Apprentice
2/10/2017 | 9:14:14 AM
Great
nice
markstone
50%
50%
markstone,
User Rank: Apprentice
7/20/2016 | 12:57:37 AM
Re: Pending Review
great post nice
geoasroy
50%
50%
geoasroy,
User Rank: Apprentice
7/13/2016 | 2:09:39 AM
Re: Pending Review
great one dis
Kylenmackey
50%
50%
Kylenmackey,
User Rank: Apprentice
7/10/2016 | 3:10:45 AM
Re: Pending Review
NICE POST DIS ONE
joelcarroll
50%
50%
joelcarroll,
User Rank: Apprentice
7/9/2016 | 7:12:56 AM
Re: Pending Review
GOOD POST NICE
Allen aldridge
50%
50%
Allen aldridge,
User Rank: Apprentice
7/5/2016 | 5:44:34 AM
Re: Pending Review
nice post dis
sangwanlal
50%
50%
sangwanlal,
User Rank: Apprentice
7/2/2016 | 2:39:49 AM
Re: Pending Review
great post
rambirsinghpal
50%
50%
rambirsinghpal,
User Rank: Apprentice
6/30/2016 | 4:04:15 AM
Re: Pending Review
like dis post
salvimorrisjal
50%
50%
salvimorrisjal,
User Rank: Apprentice
6/29/2016 | 5:48:03 PM
Re: Pending Review
GOOD NICE POST
shankarmak
50%
50%
shankarmak,
User Rank: Apprentice
6/24/2016 | 5:49:36 PM
Re: Pending Review
nice post dis
Page 1 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22953
PUBLISHED: 2021-09-23
A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to clone topics which can lead to UI inconvenience, and exhaustion of disk space.Credit for discovery: "Solar Security Research Team"
CVE-2021-22016
PUBLISHED: 2021-09-23
The vCenter Server contains a reflected cross-site scripting vulnerability due to a lack of input sanitization. An attacker may exploit this issue to execute malicious scripts by tricking a victim into clicking a malicious link.
CVE-2021-22017
PUBLISHED: 2021-09-23
Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed.
CVE-2021-22018
PUBLISHED: 2021-09-23
The vCenter Server contains an arbitrary file deletion vulnerability in a VMware vSphere Life-cycle Manager plug-in. A malicious actor with network access to port 9087 on vCenter Server may exploit this issue to delete non critical files.
CVE-2021-22019
PUBLISHED: 2021-09-23
The vCenter Server contains a denial-of-service vulnerability in VAPI (vCenter API) service. A malicious actor with network access to port 5480 on vCenter Server may exploit this issue by sending a specially crafted jsonrpc message to create a denial of service condition.