Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Perimeter posted in April 2012
How Would You Architect A New Security Monitoring Product?
Commentary  |  4/30/2012  | 
Cloud, appliance, software? If you were planning on developing a security monitoring platform, which architecture would you use?
Security Bugs And Proofs Of Concept
Commentary  |  4/27/2012  | 
Oracle's recent patch contained exploit code
PCI: Dead Man(date) Walking?
Commentary  |  4/25/2012  | 
Is Visa's program to eliminate the requirement for assessments in lieu of EMV (chip and pin) transactions the death knell for PCI? Not yet, but the writing is on the wall
2012 U.S. Election And Targeted Attack Predictions
Commentary  |  4/22/2012  | 
How the increased level and sophistication of of targeted attacks since 2008 may impact this year's U.S. Presidential election campaigns
You Need Help, Not An Accomplice
Commentary  |  4/20/2012  | 
Compliance is about being better and not just proving you are right
FBI Charges Man In $1 Million Stock-Fraud Hacking Scheme
News  |  4/18/2012  | 
Hacking crew used accounts under its control to conduct sham trades
Log Standards: Put Up, Shut Up, Give Up, Or Throw Up?
Commentary  |  4/16/2012  | 
Do we need logging standards, or should we just follow the leaders to help direct our logging efforts?
Your Compliance Is Decaying Every Day
Commentary  |  4/16/2012  | 
As soon as you train your colleagues about compliance, noncompliance is back in charge
Using Reverse Proxies To Secure Databases
Commentary  |  4/12/2012  | 
A look at database monitoring and reverse proxies
Be Ready To Clean Up That Mess
Commentary  |  4/11/2012  | 
Compliant systems do more than prevent problems -- they help solve problems that happen
Malware Getting Backed Up Along With Data
News  |  4/9/2012  | 
Sourcefire data shows how often restoring from malware-contaminated backups reinfects organizations
How Much Money Do You Need To Lose Before You Start Monitoring?
Commentary  |  4/9/2012  | 
At what point does turning a blind eye to the loss of revenue spark the inevitable conversation: 'Maybe we should be monitoring this infrastructure more closely?'
Quick-Start Guide: Compiling Mac-Robber For iOS Vuln Research
Commentary  |  4/5/2012  | 
How to compile, copy, and run mac-robber on jailbroken iOS devices
Database Security On The Cheap
Commentary  |  4/4/2012  | 
A look at some free tools to help tackle database security
Quick-Start Guide: Compiling Mac-Robber For Android Vuln Research
Commentary  |  4/2/2012  | 
How to compile, copy, and run mac-robber on rooted Android devices


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21238
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping bec...
CVE-2021-21239
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. PySAML2 does not ...
CVE-2021-21253
PUBLISHED: 2021-01-21
OnlineVotingSystem is an open source project hosted on GitHub. OnlineVotingSystem before version 1.1.2 hashes user passwords without a salt, which is vulnerable to dictionary attacks. Therefore there is a threat of security breach in the voting system. Without a salt, it is much easier for attacker...
CVE-2020-4966
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the...
CVE-2020-4968
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192427.