Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in March 2008
Security Issues Limit Telecommuting
Quick Hits  |  3/31/2008  | 
Want to work from home? Better beef up security first, CDW study says
Black Hat Researcher Hacks Biometric System
News  |  3/31/2008  | 
'Biologger' steals fingerprint, other biometric data
Tech Insight: Keeping Your Thumb on Thumb Drives
News  |  3/28/2008  | 
Those little USB drives certainly are handy, but how do you keep your company's sensitive data from walking away? Here are a few ideas
Hacked in Two Minutes
Quick Hits  |  3/28/2008  | 
In contest, researcher cracks a Mac with lightning speed using zero-day exploit
CastleCops Hit by Another DDOS Attack
News  |  3/28/2008  | 
But this time, attackers employ a 'POST' attack
Free Honeypot Client Could Sting Malware
News  |  3/27/2008  | 
The Honeynet Project has released a new automated tool for thwarting botnet and other client-side attacks
Attention, Stolen Credit Card Shoppers
Quick Hits  |  3/27/2008  | 
Sophisticated online marketplace for stolen credit cards and data offers buyers volume discounts and guarantees
Phishers Enlist Google 'Dorks'
News  |  3/26/2008  | 
Researcher finds most phishing sites use Google search terms to locate vulnerable sites
Millions of Russians' Personal Data Posted on Free Website
News  |  3/26/2008  | 
Names, addresses, account information, and other data posted by unknown source
WhiteHat: 90% of Sites Still Vulnerable
News  |  3/25/2008  | 
Most sites open to hacks via cross-site scripting, CSRF, report says
Intel Researching New Approach to Laptop Security
News  |  3/24/2008  | 
'Proteus' technology tracks user behavior, flags atypical activity
Has Banking Industry Overlooked Its Biggest Breach Ever?
Quick Hits  |  3/24/2008  | 
Insider theft case at Compass Bank affected more than 1M customers
US Firms Brace for Cyber War
News  |  3/20/2008  | 
Last year's cyber attack on Estonia was the shape of things to come, warns expert
Vietnam: 95% of Its PCs Infected With Viruses
Quick Hits  |  3/20/2008  | 
Brokerages, other sensitive Websites also vulnerable to attack, Vietnamese officials report at security conference there
Lockdown Networks Shuts Down
News  |  3/19/2008  | 
NAC vendor cites slow adoption of technology, sagging economy, and lack of VC funding
Feds Get Guilty Plea From Operation Bot Roast
News  |  3/19/2008  | 
A 21-year-old bot herder faces 10 years and a $250,000 fine
Nigerian Scammers Put Victims on Their Calendars
Quick Hits  |  3/19/2008  | 
New Google Calendar exploit is harder for filtering systems to detect
Hannaford, Security Industry Hunt for Cause of Massive Breach
News  |  3/18/2008  | 
Speculation runs rampant as grocery retailer attempts to find out how 4.2 million credit card records were stolen
Mass Hack Hits 200,000 Web Pages
Quick Hits  |  3/18/2008  | 
New exploit differs significantly from last week's ASP-oriented attacks, McAfee says
FTC Deal Suggests Enterprises Could Be Liable for Poor Security
News  |  3/17/2008  | 
ValueClick found negligent when Commission discovers vulnerabilites contrary to privacy policies promising encryption and 'reasonable security measures'
Big Bucks Bug-Brokering Program Shuttered
News  |  3/17/2008  | 
'Cadillac' buyers were taking too long to close the deal
Curiosity Over Britney Kills Careers of 13 Cats
Quick Hits  |  3/17/2008  | 
UCLA Medical Center employees lose jobs after peeking at pop star's private files
Hacking Vista's Smart Cards
News  |  3/14/2008  | 
Former Microsoft security team member will demonstrate how his new fuzzer hacks smart card plug-in
Tech Insight: De-Fanging P2P
News  |  3/14/2008  | 
Peer-to-peer has gotten a bad rap, but there are ways to secure its legitimate use in your organization
Kurt Cobain: Ghost or ID Theft Victim?
Quick Hits  |  3/14/2008  | 
Legendary rock star is still buying houses long after his tragic death, according to widow Courtney Love
McAfee Warns of Mass Web Attack
News  |  3/13/2008  | 
At least 10,000 pages affected, researchers warn
Certegy Victims Offered Less Than a Buck
Quick Hits  |  3/13/2008  | 
Proposed settlement includes free credit monitoring services and $4M in reimbursements following massive data breach
Hacking WiFi
News  |  3/13/2008  | 
Here's an evil twin that can seriously alter your Starbucks experience
NSA Pushes 'Labeled' Access Control for NFS
News  |  3/13/2008  | 
National Security Agency's technology would tighten access to sensitive files and apps on NFS storage
When Bad Tech Leads to Worse Results
News  |  3/12/2008  | 
E-voting, 'friendly' worms may be flawed - and misunderstood
eEye to Add Retina Web App Scanner
Quick Hits  |  3/12/2008  | 
New software is rebranded version of NT Objectives's NTOSpider
Spam Takes a Vacation
News  |  3/11/2008  | 
South sea islands account for more spam per capita than anyplace else in the world
FTP Hacking on the Rise
News  |  3/11/2008  | 
First it was stolen FTP server admin privileges. Now it's spam messages with bot-infected FTP links
Australian Government Systems Under Attack
News  |  3/10/2008  | 
Officials not ready to say China is the source
Battle Against Fast-Flux Botnets Intensifies
News  |  3/10/2008  | 
ICANN proposes recommendations to help disrupt, and ultimately take down, these stealthy botnets
WhiteHat, F5 Offer 'Click & Fix' for Web App Vulnerabilities
Quick Hits  |  3/10/2008  | 
Integration deal automatically fixes cross-site scripting, SQL injection flaws on Websites
Cyber Preparedness Symposium Leaves Unanswered Questions
News  |  3/7/2008  | 
Effort to jump-start discussion between government, industry, and academia is clearly Version 1.0
Art Imitates Malware
Quick Hits  |  3/7/2008  | 
Or does malware imitate art? Award-winning artist uses malware code to create artistic renditions of Storm, Netsky, and other infamous threats
Surge of Phishing Kits Hits the Net
News  |  3/6/2008  | 
Researchers are investigating an unusually high volume of free phishing kits - over 400 - now in the wild
Encrypted PCs Still at Risk
Quick Hits  |  3/6/2008  | 
Scientists demonstrate ability to extract encryption keys that linger in PC memory
Hacking: The New Child's Play?
News  |  3/5/2008  | 
Researchers worry as teens and pre-teens play an increasing role in illegal online exploits
Tool Physically Hacks Windows
News  |  3/5/2008  | 
Lets an attacker use Firewire to take over a 'locked' Windows machine
What Are You Looking at?
Quick Hits  |  3/5/2008  | 
Prototype 'cyber-goggles' record everything they see - and index it for later analysis
Researchers Map Method for Spotting Suspicious Insiders
News  |  3/4/2008  | 
Mining of email data could help companies spot dangerous employees before they do damage
New Method IDs Phishing, Malicious Domains
News  |  3/4/2008  | 
Researchers at a secretive security summit hosted by Yahoo revealed new ways they are finding phishers and other bad sites
Survey: Enterprises Don't Know Sensitive Data Flow
Quick Hits  |  3/4/2008  | 
Upcoming report from The 451 Group demonstrates how little progress enterprises have made in identifying and protecting sensitive data
SNMP Scan Nets Thousands of Vulnerable Devices
News  |  3/3/2008  | 
Researchers find products from Cisco, Apple, and Microsoft are vulnerable
Canadian Cops Bust Identity Theft 'Hub'
News  |  3/3/2008  | 
Nine arrested, suspected of being part of larger ID theft ring
Hackers Cut in Line to Buy Tickets
Quick Hits  |  3/3/2008  | 
Hack allows buyers to jump to the front of the queue and purchase prime tickets online before fans can get to them


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41617
PUBLISHED: 2021-09-26
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with gro...
CVE-2021-3830
PUBLISHED: 2021-09-26
btcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-21742
PUBLISHED: 2021-09-25
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.
CVE-2020-20508
PUBLISHED: 2021-09-24
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
CVE-2020-20514
PUBLISHED: 2021-09-24
A Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/<id>.html allows authenticated attackers to delete all users.