Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in April 2007
Page 1 / 2   >   >>
DNS Center Resource Launches
News  |  4/30/2007  | 
DNSstuff.com unveils DNS resource center; announces content partnership with Infoblox
DOS Gets Political in Estonia
News  |  4/30/2007  | 
Online attacks disable government sites as riots and arrests roil former Soviet republic
MarkMonitor Releases Index
News  |  4/30/2007  | 
MarkMonitor released the company's first Brandjacking Index, a quarterly report that measures the effect of online threats to brands
Websense to Buy SurfControl
News  |  4/27/2007  | 
$400 million deal will merge two top end-user monitoring tools
Disk-o Inferno
News  |  4/27/2007  | 
As portable devices multiply, maybe it's time to secure the data instead of the device
Google AdWords Attack Video
News  |  4/27/2007  | 
Exploit Prevention Labs released a video documenting how cyber criminals are using Google's AdWords to infect unsuspecting users with malware
Telcos at Risk of Web Bugs
News  |  4/27/2007  | 
Service providers face security learning curve as they roll out next-generation Web services
What Imus Can Teach IT
News  |  4/27/2007  | 
Shock jock's implosion illustrates several lessons about the prevention and containment of data breaches
Experts: US Not Prepared for Cyber Attack
News  |  4/26/2007  | 
Multi-billion-dollar investment recommended to mitigate threats
Rutkowska Launches Own Startup
News  |  4/26/2007  | 
Famed hacker's company to demo new Vista hacks, other stealth malware attacks at Black Hat USA
GFI Launches Storage Device Scanner
News  |  4/26/2007  | 
GFI launches free, online portable storage device scanner
Microsoft's Happy Bugfinder
News  |  4/25/2007  | 
Michael Howard chats up Vista security, rugby, and working with Bill Gates
Dial '72-Duh'
News  |  4/24/2007  | 
Stupid phishing tricks 101: This new scam is a little too forward
Startup on Search and Destroy Mission
News  |  4/24/2007  | 
Robot Genius to team with ISPs, search-engine, and firewall vendors to find Web-borne malware in real-time
Exploit Prevention Labs Reports Results
News  |  4/24/2007  | 
Exploit Prevention Labs: Chinese hackers take over the number one slot, ANI exploit hits hard in final days of March
Webroot Announces Most Common Threats
News  |  4/24/2007  | 
Webroot Software announces the most common forms of malicious security threats in the UK, at InfoSecurity Europe 2007
Sophos Reveals Rise of Malware
News  |  4/24/2007  | 
Sophos announced the results of its research into worldwide cybercrime activity during the first three months of 2007
Re-Thinking PCI
News  |  4/24/2007  | 
The Payment Card Industry standard wasn't just designed for banks - it's also intended to protect consumers
Mu Security Discovers Vulnerability
News  |  4/23/2007  | 
Mu Security has discovered and provided details to remediate a pre-authentication vulnerability in the Mac OS X RPC runtime library
Sweetening the Honeypot
News  |  4/23/2007  | 
Experts disagree whether free tools will make honeynets more practical for enterprise IT deployment
Barclays Bank Selects Shavlik
News  |  4/23/2007  | 
Shavlik, Satisnet team to fill need for fast and accurate patch status and configuration policy enforcement for global banking leader
Miami-Dade Selects Sophos
News  |  4/23/2007  | 
Miami-Dade Public Schools has selected Sophos to protect 90,000 desktops and 50,000 email accounts
Concentric Reduces Email Load, Spam
News  |  4/23/2007  | 
Concentric announced the expansion of the company's messaging, collaboration, DNS, and hosting services with PEP
USBs' Giant Sucking Sound
News  |  4/20/2007  | 
Most organizations house critical data on laptops, USB thumb drives, and iPods, new survey says
Want Turns to Need
News  |  4/20/2007  | 
Software security is no longer an emerging discipline, and here's why enterprises should care
Ranking Bugs, Saving Pigs
News  |  4/19/2007  | 
The man behind the SANS Top 20, Rohit Dhamankar, calls out bugs - and animal rights
DNS Flaw Creates Botnet Threat
News  |  4/19/2007  | 
FireEye announced that its FireEye Attack Confirmation Technology (FACT) stops botnets exploiting a zero-day flaw in Microsoft's DNS server
Aliens, Protein, and Bots
News  |  4/19/2007  | 
Today's grids may be tomorrow's botnets
Security, Post-Va. Tech
News  |  4/19/2007  | 
It's time to address two common mistakes made in responding to these kinds of disasters
Targeted Attacks on the Rise
News  |  4/18/2007  | 
Most attacks target a single user, report says
Criminals Try to Capitalize on Tragedy
News  |  4/18/2007  | 
Sophos warns individuals of a social engineering phishing campaign that attempts to capitalize on the tragedy at Virginia Tech
Botnets Battle Over Turf
News  |  4/18/2007  | 
Some botnets even patch their infected machines to prevent other botnets from hijacking them
MarkMonitor Helps Bank Foil Phishers
News  |  4/18/2007  | 
Nationwide has successfully deployed Antiphishing Solutions from MarkMonitor to automatically identify and shut down phishing scams
Barracuda Profiles Spammers
News  |  4/18/2007  | 
Barracuda Networks announced the Predictive Sender Profiling capabilities of the Barracuda Spam Firewall
Centennial Warns Users to Fix Bugs
News  |  4/18/2007  | 
Centennial warned Windows users not to underestimate the importance of deploying the latest fixes across their entire Windows PC estate
Because That's Where the Money Is
News  |  4/18/2007  | 
Just like banks, corporate content filters can provide the bad guys with valuable things to steal
Experts: DNS Attacks Could Go Deeper
News  |  4/17/2007  | 
DNS botnet exploits are bad, but potential for an attacker to 'own' your DNS server is much worse
Applicure Monitors, IDs Web Attacks
News  |  4/17/2007  | 
Applicure Technologies launches the first software tool to alert in real time upon any attempt to attack the Web server
I Am Not Angry, Dammit!
News  |  4/17/2007  | 
'Emotion detection' means the cranky wheel will always get the oil
Fortinet Finds Akamai Vulnerability
News  |  4/17/2007  | 
Remote buffer overflow vulnerability could allow attackers to control victims' systems
Retailers Still Lag in PCI Compliance
News  |  4/17/2007  | 
Despite recent data breaches, more than half still have not implemented guidelines for protecting credit card data
Agnitum Pre-Releases Security Suite
News  |  4/17/2007  | 
Agnitum delivered the final pre-release version of the company's Outpost Security Suite Pro
Hostopia Goes Arbor
News  |  4/17/2007  | 
Hostopia.com has selected Arbor Peakflow SP to protect their network against a wide range of security threats
SCADA State of Denial
News  |  4/16/2007  | 
More bugs and security tools for process control industry - but it's more a mindset than a technology problem
Loan Companies Abusing Student Database
News  |  4/16/2007  | 
Financial companies accused of unauthorized mining of National Student Loan Data System
SPI Details Web App Hacking
News  |  4/16/2007  | 
SPI Dynamics will lead five presentations throughout the week of April 16 at the Software Security Summit and STPCon
Electoral Subtext
News  |  4/16/2007  | 
Whether you're monitoring the voting process or the status of your most valued server, you better have a Plan B
Watchfire Adds Vulnerability Tester
News  |  4/16/2007  | 
Watchfire introduced the industry's most flexible web application security solution, Watchfire AppScan 7.5
Zero-Day Fever
News  |  4/13/2007  | 
Latest zero-day attack hits Microsoft DNS servers, may be abused by botnet operators
Study: Browser Warnings Don't Work
News  |  4/13/2007  | 
Despite lock-and-key icons and pop-up alerts, banking users just keep on loggin' on, Harvard/MIT researchers say
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8966
PUBLISHED: 2020-04-01
There is an Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in php webpages of Tiki-Wiki Groupware. Tiki-Wiki CMS all versions through 20.0 allows malicious users to cause the injection of malicious code fragments (scripts) into a legitimate web page.
CVE-2020-11463
PUBLISHED: 2020-04-01
An issue was discovered in Deskpro before 2019.8.0. The /api/email_accounts endpoint failed to properly validate a user's privilege, allowing an attacker to retrieve cleartext credentials of all helpdesk email accounts, including incoming and outgoing email credentials. This enables an attacker to g...
CVE-2020-11464
PUBLISHED: 2020-04-01
An issue was discovered in Deskpro before 2019.8.0. The /api/people endpoint failed to properly validate a user's privilege, allowing an attacker to retrieve sensitive information about all users registered on the system. This includes their full name, privilege, email address, phone number, etc.
CVE-2020-11465
PUBLISHED: 2020-04-01
An issue was discovered in Deskpro before 2019.8.0. The /api/apps/* endpoints failed to properly validate a user's privilege, allowing an attacker to control/install helpdesk applications and leak current applications' configurations, including applications used as user sources (used for authenticat...
CVE-2020-11466
PUBLISHED: 2020-04-01
An issue was discovered in Deskpro before 2019.8.0. The /api/tickets endpoint failed to properly validate a user's privilege, allowing an attacker to retrieve arbitrary information about all helpdesk tickets stored in database with numerous filters. This leaked sensitive information to unauthorized ...