News & Commentary

Content tagged with Compliance posted in June 2006
Group to Research ID Theft
News  |  6/29/2006  | 
Universities, law enforcement agencies, and vendors team to study fraud and identity theft
Fraud Monitoring Appliance on Tap
News  |  6/26/2006  | 
Cydelity appliance gives banks a detailed look at suspicious account activity
Data Losses Hit Four More
News  |  6/22/2006  | 
The list of big-name organizations reporting security breaches just keeps growing
Thieves Nab AIG Customer Records
News  |  6/19/2006  | 
AIG is informing customers this week about the theft of a server containing personal data on about 970,000 customers
DC Workers' Personal Data Stolen
News  |  6/19/2006  | 
An unprotected laptop containing names, Social Security numbers, and other data on 13,000 District of Columbia employees was stolen last week
Social Engineering Gets Smarter
News  |  6/16/2006  | 
Good old-fashioned schmooze still the best way to get information and access, particularly if the target works in IT
Desktop Ports: Leakage or Lockdown
News  |  6/14/2006  | 
Enterprises struggle to enforce security policies on thumb drives and other portable storage media
RSA to Access Mid-Sized Businesses
News  |  6/12/2006  | 
RSA's new Access Manager 6.0 is aimed at organizations under the compliance microscope
Microsoft Moves Security to 'Forefront'
News  |  6/12/2006  | 
Microsoft gives its security wares a bold new name and rolls out a new security gateway at Tech Ed 2006
Microsoft Serves Up Security Services
News  |  6/6/2006  | 
Live Labs services hit developer hot buttons like authentication and peer-to-peer apps
Lancope Digs Into User Behavior
News  |  6/5/2006  | 
New user identity tracking capabilities will open up new security troubleshooting opportunities, vendor says
Security Spending Shifts
News  |  6/2/2006  | 
Merrill Lynch survey: Security spending up, overall IT spending down amid broader economic concerns
Securify Pinpoints Insider Threats
News  |  6/1/2006  | 
New tool tracks end user behavior in real time, helping IT spot potential trouble


'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.