Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by WKash

WKash
Member Since: March 12, 2014
Apprentice
Posts: 587

Most Recently Posted

69 items
Comment: Snowden Impact - WKash - 3/11/2014
Comment: Hard to trace - WKash - 3/11/2014
Comment: Assessors - WKash - 3/6/2014
Comment: Protected - WKash - 3/3/2014
Comment: Re: A complicated issue - WKash - 2/18/2014
Comment: Re: Thanks for updating - WKash - 2/18/2014
Comment: Re: Thanks for updating - WKash - 2/18/2014
Comment: Thanks for updating - WKash - 2/14/2014
Comment: NIST NSTICk - WKash - 2/10/2014
Comment: Power Play - WKash - 1/31/2014
Comment: Event Planners Beware - WKash - 1/23/2014
Comment: Cloud security - WKash - 1/7/2014
Comment: On the Light Side - WKash - 1/6/2014
Comment: Reputation Management - WKash - 12/31/2013
Comment: Re: Quid pro what? - WKash - 12/23/2013
Comment: Our Things - WKash - 12/20/2013
Comment: Re: The business case - WKash - 12/13/2013
Comment: Re: Spying - WKash - 12/12/2013
Comment: Re: Spying - WKash - 12/10/2013
Comment: Passwords - WKash - 12/5/2013
Comment: Virtual Highway Robbery - WKash - 11/27/2013
Comment: Hard Pill to Swallow - WKash - 11/20/2013
Comment: FBI Sees Shift in Focus - WKash - 11/19/2013
Comment: re: Secure Data, Not Devices - 8/29/2013


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.