Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by Joe Stanganelli

Joe Stanganelli
Member Since: November 15, 2013
Posts: 1180

posted in February 2018

25 items
Comment: js12 - Joe Stanganelli - 2/28/2018
Comment: js11 - Joe Stanganelli - 2/28/2018
Comment: js10 - Joe Stanganelli - 2/27/2018
Comment: js9 - Joe Stanganelli - 2/27/2018
Comment: js8 - Joe Stanganelli - 2/27/2018
Comment: js7 - Joe Stanganelli - 2/27/2018
Comment: js6 - Joe Stanganelli - 2/26/2018
Comment: js5 - Joe Stanganelli - 2/26/2018
Comment: Re: 96%? - Joe Stanganelli - 2/26/2018
Comment: Re: EMV - Joe Stanganelli - 2/26/2018
Comment: Re: passwords - Joe Stanganelli - 2/25/2018
Comment: js4 - Joe Stanganelli - 2/25/2018
Comment: EMV - Joe Stanganelli - 2/25/2018
Comment: js3 - Joe Stanganelli - 2/21/2018
Comment: js2 - Joe Stanganelli - 2/20/2018
Comment: js1 - Joe Stanganelli - 2/20/2018

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-09-21
Blacklist bypass issue exists in WUZHI CMS up to and including 4.1.0 in common.func.php, which when uploaded can cause remote code executiong.
PUBLISHED: 2021-09-21
Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.
PUBLISHED: 2021-09-21
The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by ...
PUBLISHED: 2021-09-21
http4s is an open source scala interface for HTTP. In affected versions http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: Header names (`Header.name`Ã¥), Header values (`Header.value`), Status r...
PUBLISHED: 2021-09-21
This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.