Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

Content posted in April 2006
Do Your Passwords Pass Microsoft's Test?
Commentary  |  4/25/2006  | 
There's a scene in the movie Spaceballs when King Roland, having given in to Dark Helmet's threats, tells him that the combination to his planet's "air shield" is 1, 2, 3, 4, 5. Exasperated, Dark Helmet responds, "That's the stupidest combination I've ever heard in my life! The kind of thing an idiot would have on his luggage!" Moments later, we learn that this is indeed the combination to the evil President Skroob's luggage. At this point, we're pretty sure that Lone Starr and the rest o
Security Research Isn't Pretty, But It's Necessary
Commentary  |  4/17/2006  | 
Security research is a dirty job, but somebody has to do it. Security researchers run an assembly line of self-aggrandizing publicity, churning out press releases and announcements patting themselves on the back for discovering security vulnerabilities in software by Microsoft, Oracle, and other major vendors. The researchers operate under a constant cloud of suspicion: Are they simply creating a climate of useless fear, stifling innovation, E-commerce, and technology implementation? Are they
Software Security Groupies Kiss And Tell
Commentary  |  4/13/2006  | 
Bet you didn't know that software companies, like rock stars, have groupies. Rock star groupies know every word to every one of their favorite band's songs, and they know how to wrangle backstage passes that make them privy to the band's inner workings. In my April 17 article on software companies and the security researcher groupies who love them, I spin a yarn about several instances where researchers found their way onto the proverbial tour bus. Do the people in charge of IT security really w
IT Security: Playing To Win
Commentary  |  4/11/2006  | 
Security company Fortify Software today released a Flash-based game called IT Defender that attempts to educate players about workplace security risks while they risk their jobs by playing a game at work. Sure, it's a PR ploy. But it's a good one. (Really, anything is better than another press release.) As a game, it's nothing groundbreaking, but it's nicely done for what it is.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23418
PUBLISHED: 2021-07-29
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks.
CVE-2020-5329
PUBLISHED: 2021-07-29
Dell EMC Avamar Server contains an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links.
CVE-2020-5353
PUBLISHED: 2021-07-29
The Dell Isilon OneFS versions 8.2.2 and earlier and Dell EMC PowerScale OneFS version 9.0.0 default configuration for Network File System (NFS) allows access to an 'admin' home directory. An attacker may leverage a spoofed Unique Identifier (UID) over NFS to rewrite sensitive files to gain administ...
CVE-2021-21538
PUBLISHED: 2021-07-29
Dell EMC iDRAC9 versions 4.40.00.00 and later, but prior to 4.40.10.00, contain an improper authentication vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain access to the virtual console.
CVE-2021-21546
PUBLISHED: 2021-07-29
Dell EMC NetWorker versions 18.x,19.x prior to 19.3.0.4 and 19.4.0.0 contain an Information Disclosure in Log Files vulnerability. A local low-privileged user of the Networker server could potentially exploit this vulnerability to read plain-text credentials from server log files.