News & Commentary

Content tagged with Compliance posted in September 2009
New Trojan Evades Banks' Anti-Fraud Systems
News  |  9/30/2009  | 
'URLZone' calculates how much money to steal from a victim's account without raising suspicion
IRS virus demonstrates stupidity is rampant
Commentary  |  9/29/2009  | 
The proliferation of the current IRS virus demonstrates stupidity is rampant on the Internet.
Cybercriminals Offer 43 Cents For An Infected Mac
Quick Hits  |  9/25/2009  | 
Sophos researcher offers a peek at the inner workings of an infamous Russian affiliate network
Spuds And Spam: Idaho No. 1 Most Spammed State
Quick Hits  |  9/24/2009  | 
MessageLabs reveals list of U.S. states that get the most spam
Up To 9 Percent Of Machines In An Enterprise Are Bot-Infected
News  |  9/24/2009  | 
Most are members of tiny, unknown botnets built for targeting victim organizations
New 'Chat-In-The-Middle' Phishing Attack Discovered
Quick Hits  |  9/17/2009  | 
Phishers go Web 2.0 by chatting it up with their online banking victims
Symark Buys BeyondTrust, Takes BeyondTrust Name
Quick Hits  |  9/14/2009  | 
Merged company will work to integrate privilege management in Unix, Windows environments
New iPhone Anti-Phishing Feature Fails
News  |  9/10/2009  | 
Researchers discover iPhone OS 3.1's anti-phishing feature is not working properly
Men Reuse Passwords More Than Women, Study Says
Quick Hits  |  9/4/2009  | 
More than half of French users reuse passwords, PC Tools survey finds
Infected PCs Contain Average Of Three Different Types of Malware
Quick Hits  |  9/3/2009  | 
New Eset scan data reflects cybercrime trends in malware creation, installation, AV firm says


WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-8023
PUBLISHED: 2018-09-21
Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timin...
CVE-2018-14643
PUBLISHED: 2018-09-21
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
CVE-2018-14645
PUBLISHED: 2018-09-21
A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service.
CVE-2018-1685
PUBLISHED: 2018-09-21
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 contains a vulnerability in db2cacpy that could allow a local user to read any file on the system. IBM X-Force ID: 145502.
CVE-2018-1710
PUBLISHED: 2018-09-21
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.1, 10.5, and 11.1 tool db2licm is affected by buffer overflow vulnerability that can potentially result in arbitrary code execution. IBM X-Force ID: 146364.