Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in January 2007
Page 1 / 2   >   >>
Vendors Prep for Database Security War
News  |  1/31/2007  | 
New products set to roll as enterprises look to safeguard their most sensitive data
Reveleus Unveils GRC Framework
News  |  1/31/2007  | 
Reveleus unveils the first governance, risk, and compliance framework for the financial services industry
Symantec CEO to Keynote at RSA
News  |  1/31/2007  | 
Symantec announced that John W. Thompson will keynote at the RSAR Conference 2007
Outer Limits of IPS
News  |  1/30/2007  | 
Anomaly- and rules-based protections are nice, but they have their limitations
More Thefts From TJX Breach
News  |  1/30/2007  | 
Retail giant out of compliance with PCI security requirements, according to Visa alert
US Military Roadmap: 'Fight the Net'
News  |  1/30/2007  | 
Declassified Defense Department document reveals US military's strategy for using information as a weapon
Shavlik Makes Acquisition
News  |  1/30/2007  | 
Shavlik acquires UpdateExpert from St. Bernard Software
MessageLabs Reports Findings
News  |  1/30/2007  | 
MessageLabs announced the results of its MessageLabs Intelligence Report for January 2007
IBM Reports Survey Results
News  |  1/30/2007  | 
IBM announced the highlights of its 2006 security statistics report
Radware Unveils Security Strategy
News  |  1/30/2007  | 
Radware unveils advanced behavioral security strategy for enterprises and carriers
Symantec, HP Extend Relationship
News  |  1/30/2007  | 
Symantec announced the signing of a multi-year extension to its existing contract with HP, the worldwide PC sales leader
Savant Unveils Hybrid Malware Solution
News  |  1/29/2007  | 
Savant Protection unveils the industry's first hybrid malware solution
Sophos Relocates North American HQ
News  |  1/29/2007  | 
Sophos announced the relocation of its North American headquarters to Burlington
A Free Database Scanner
News  |  1/29/2007  | 
Imperva's new free Scuba database scanner tool dives deep into the database to pinpoint weaknesses
ScanSafe Reports Spyware Surge
News  |  1/29/2007  | 
ScanSafe, the leading global provider of Web Security-as-a-Service, issued its Annual Global Threat Report
Symantec Buys Altiris for $830M
News  |  1/29/2007  | 
Security giant plans to take on Microsoft in desktop management, end-point security
Seven Ways to Be Mistaken for a Spammer
News  |  1/29/2007  | 
How to keep your organization's mail from being caught in the spam filter
SPI Unveils Phoenix Architecture
News  |  1/29/2007  | 
SPI Dynamics announced the company's Phoenix architecture
Symantec Adds to Board
News  |  1/29/2007  | 
Symantec appoints Frank E. Dangeard to the board of directors
EEye Adds AV to Blink
News  |  1/28/2007  | 
EEye Digital Security incorporates antivirus protection into Blink Professional, its endpoint security product
IBM's 'Need to Know' Software
News  |  1/26/2007  | 
IBM's Idemix application lets consumers do business on the Web without giving away unnecessary personal data
Microsoft's 'Secret' Security Summit
News  |  1/26/2007  | 
Microsoft hosts meeting of security experts, who are plotting to wrest control of the Internet back from the bad guys
Should IT Block iPhone?
News  |  1/26/2007  | 
Developing hardware policies is an important part of the security organization's strategic role
SIM/Net Management Combo on Tap
News  |  1/26/2007  | 
eIQnetworks is about to release a new tool that integrates security and network management info
Shivering in Their Breaches
News  |  1/26/2007  | 
Afraid of bad publicity, large organizations delay in warning customers of major security failures
Radware Protects Customers From Worm
News  |  1/26/2007  | 
Radware announced the immediate protection against the W32.Rahack.W worm
Cybertrust Enters EV SSL Fray
News  |  1/25/2007  | 
Experts question whether new browser security will make Internet users any safer
Service Providers Team to Fight Spam
News  |  1/25/2007  | 
Messaging Anti-Abuse Working Group to collaborate against spam, botnets, and zombies
Bradford Intros Product Family
News  |  1/25/2007  | 
New NAC Director delivers comprehensive access control for wired, wireless, and VPN connections
CSOs, On the Wagon
News  |  1/25/2007  | 
Even chief security officers have their vices - and need a 12-step program
Webroot Finds Weaknesses
News  |  1/25/2007  | 
Webroot threat researchers find Vista anti-spyware component fails to block 84 percent of most common spyware
DOD Certifies nCircle
News  |  1/24/2007  | 
Provider of security risk and compliance management solutions receives DITSCAP certification from the US Department of Defense
Search Engine Lists Stolen Data
News  |  1/24/2007  | 
TrustedID launches free service to help consumers find out if their data has been compromised
Intrusic Shuttered
News  |  1/24/2007  | 
Internal threat detection firm undone by complicated technology, competition
Symantec Reports Results
News  |  1/24/2007  | 
Symantec reported results for the third quarter of fiscal year 2007, ended Dec. 29, 2006
Pushback on Chargebacks
News  |  1/24/2007  | 
User data inside browser could hold the key to reducing online fraud and losses
Calyptix Protects Customers From Trojan
News  |  1/24/2007  | 
Calyptix has successfully protected its customers from a new email virus widely known as the Storm Trojan, without reliance on static signatures
Q&A: 'Weld Pond' Talks Secure Software
News  |  1/23/2007  | 
Chris Wysopal sheds light on how his revolutionary testing technology saw the light of day, and discusses his new book, and his security fears
Exploit Releases Survey
News  |  1/23/2007  | 
Exploit package dominates with 70.9% of all occurrences
Mobile Commerce: Hackers' Next Target?
News  |  1/23/2007  | 
Tower Group says financial services industry is overlooking the prospect of mobile malware
Living Off the Grid
News  |  1/23/2007  | 
Planning for disaster recovery before you're stuck with a crippled cable service
PhishTank Looks to Expand
News  |  1/23/2007  | 
PhishTank's operators are looking for a few good developers to expand and grow the anti-phishing site
Cloudmark Helps Stem Spam
News  |  1/23/2007  | 
Latest Cloudmark release lets ISPs deliver unprecedented accuracy, virtually eliminating spam
Perimeter Offers Free Scan
News  |  1/23/2007  | 
Perimeter eSecurity announced that it will provide free vulnerability scans now through March 2, 2007
Sophos Publishes Report
News  |  1/22/2007  | 
Sophos has published its Security Threat Report 2007, examining the threat landscape during 2006, and predicting developments for 2007
26 IRS Computer Tapes Missing
News  |  1/22/2007  | 
Taxpayer data delivered to city of Kansas City in August still has not been found, agency says
Security Startups Make Debut
News  |  1/22/2007  | 
Veracode debuts on-demand software security analysis service, and Provilla, endpoint data-leakage appliance
Cisco's New Opportunity
News  |  1/19/2007  | 
IronPort acquisition could open up possibilities that go well beyond messaging security
Data Losses Strike Three More Firms
News  |  1/19/2007  | 
Banks in Sweden and Canada join TJX, Moneygram in reporting exposure of private customer data
Company Cuts Privileges to Cut Malware
News  |  1/19/2007  | 
Gwinnett Health Systems stripped its client machines of admin and power-user rights and has seen a reduction in malware
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26180
PUBLISHED: 2021-07-28
Dell EMC Isilon OneFS supported versions 8.1 and later and Dell EMC PowerScale OneFS supported version 9.0.0 contain an access issue with the remotesupport user account. A remote malicious user with low privileges may gain access to data stored on the /ifs directory through most protocols.
CVE-2020-5341
PUBLISHED: 2021-07-28
Deserialization of Untrusted Data Vulnerability Dell EMC Avamar Server versions 7.4.1, 7.5.0, 7.5.1, 18.2, 19.1 and 19.2 and Dell EMC Integrated Data Protection Appliance versions 2.0, 2.1, 2.2, 2.3, 2.4 and 2.4.1 contain a Deserialization of Untrusted Data Vulnerability. A remote unauthenticated ...
CVE-2020-5351
PUBLISHED: 2021-07-28
Dell EMC Data Protection Advisor versions 6.4, 6.5 and 18.1 contain an undocumented account with limited privileges that is protected with a hard-coded password. A remote unauthenticated malicious user with the knowledge of the hard-coded password may login to the system and gain read-only privilege...
CVE-2021-32788
PUBLISHED: 2021-07-27
Discourse is an open source discussion platform. In versions prior to 2.7.7 there are two bugs which led to the post creator of a whisper post being revealed to non-staff users. 1: Staff users that creates a whisper post in a personal message is revealed to non-staff participants of the personal mes...
CVE-2021-32796
PUBLISHED: 2021-07-27
xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes durin...