Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2007
Page 1 / 3   >   >>
Phishers Play Top 40
News  |  8/31/2007  | 
Latest spam pretends to be video from your favorite musical artist
Bimba Deploys Sidewinder
News  |  8/31/2007  | 
Secure Computing announced that Bimba Manufacturing has switched to the Sidewinder Network Gateway Security appliance
When Web Servers Attack
News  |  8/30/2007  | 
Even in a DMZ, a Web server can be a dangerous weapon
Comodo Intros Memory Guardian
News  |  8/30/2007  | 
Comodo introduces Memory Guardian to protect consumers against buffer overflow attacks
Korea Investigates Anti-Spyware Makers
News  |  8/30/2007  | 
Korean government asks police to look into 'anti-spyware' tools that actually spread spyware
Storm Hits Blogger
News  |  8/30/2007  | 
The ubiquitous Storm Trojan has found a new home - on spam blog sites in Google's Blogger network
On the Trail of 'Fast Flux' Botnets
News  |  8/29/2007  | 
Stealth botnet method makes botnets hard to kill, but not impossible
Consumers Concerned With Phishing
News  |  8/29/2007  | 
Cloudmark announced the results of a nationwide poll conducted on its behalf by Harris Interactive
PDF Spam Declines Sharply
News  |  8/29/2007  | 
'Is PDF spam simply not working for the spammers?' Sophos asks
Jordan's Furniture Selects Sophos
News  |  8/29/2007  | 
Jordan's Furniture selected Sophos Endpoint Security and Control
Enterprises Wrestle With Security Policies
News  |  8/28/2007  | 
Corporate security policies often are not enforced, according to newly-published survey by RSA and Forrester
'Dream Team' Takes on Black Hats
News  |  8/28/2007  | 
Feds, law enforcement, ISPs, and researchers pow-wow in closed meeting on how to catch the bad guys
Black Hat's Video Review
News  |  8/28/2007  | 
One-on-one interviews offer a new view on Black Hat's key issues
Promisec Helps SMEs Combat Security Threats
News  |  8/28/2007  | 
SMEs need to address internal threats, leverage automation to ensure highest levels of security and threat mitigation
IM Threats Spike Nearly 100% in August
News  |  8/28/2007  | 
Akonix IM Threat Watch tracks 38 attacks
Sophos: Don't Download That YouTube Video
News  |  8/28/2007  | 
New variation of Storm worm drops Ecard disguise for online movie masquerade
Merchant-Accounts.ca, Comodo Partner
News  |  8/28/2007  | 
Merchant-Accounts.ca and Comodo announce partnership to deliver PCI compliance and Web vulnerability scanning to Canadian customers
Symantec Launches Norton 2008
News  |  8/28/2007  | 
Symantec announced the launch of Norton Internet Security 2008 and Norton AntiVirus 2008
China's Premier 'Gravely Concerned' by Hack on Germany
News  |  8/27/2007  | 
Top-ranked officials discuss alleged cyber attack at diplomatic meeting
New Intel Processor Fights Rootkits, Virtualization Threats
News  |  8/27/2007  | 
But experts say new features still aren't true anti-rootkit technologies
Study: SMBs Overconfident in IT Security
News  |  8/27/2007  | 
According to Websense, SMBs fail to take adequate steps to reduce the risk off data loss from Web-based security threats
Anchiva Delivers 800,000 Signatures
News  |  8/27/2007  | 
Rapid RxLabs is now delivering over 800,000 signatures to detect and prevent malware from entering enterprise networks
Phishers in Microsoft's Clothing
News  |  8/24/2007  | 
Two new spam scams masquerade as official messages from top Microsoft officials
Red Curtain Reveals Malware
News  |  8/24/2007  | 
Free tool helps expose malicious software by its behavior
The Lost Companies
News  |  8/24/2007  | 
Security troubles lead to disappearance of two established organizations in two months
Hacking for Charity
News  |  8/23/2007  | 
New organization looking for a few good hackers to assist nonprofits - gratis
'Defenestration' Testing
News  |  8/23/2007  | 
Does your organization even know what secrets it's supposed to be keeping?
Crypto Makes the Grade at Baylor
News  |  8/23/2007  | 
University taps PGP to protect faculty, staff laptops - and to comply with state laws in the event of data loss
Eight Sure-Fire Ways to Beat a Security Audit
News  |  8/23/2007  | 
Experts share tips on how to avoid the most common pitfalls in an audit
Slammer, Other Older Threats Making a Comeback
News  |  8/23/2007  | 
Researchers at IBM ISS say Slammer is the most common network threat they see today due to 'retired' signatures
UK Plans Big Spend on ID Management
News  |  8/22/2007  | 
Public-sector spending will increase 50 percent in the next year alone, new study says
Hacking Germany's New Computer Crime Law
News  |  8/22/2007  | 
German and US researchers lay low, question just how far new law will go
Finding the Leaks in Leak Prevention
News  |  8/22/2007  | 
Data leak prevention tools may not be enough to stop determined bad apples
Bitdefender: Students Need Update
News  |  8/22/2007  | 
BitDefender warns college students about the need to protect their computers with the latest security software updates
Ukranian Suspect Could Help Break TJX Case
News  |  8/22/2007  | 
Details of the TJX hack begin to rapidly unfold thanks to a recent arrest
Beware of 'Confirmation Spam'
News  |  8/22/2007  | 
Marshal issues warning against new storm of 'confirmation spam'
Site Services Pay Damages for Bill-Doctoring
News  |  8/21/2007  | 
Website services put $24 million worth of unauthorized charges on customers' bills, FTC says
Cenzic Patent Case Worries Web Researchers, Vendors
News  |  8/21/2007  | 
Controversial patent could affect other Web app scanners, research
Blue Lane Passes Microsoft Interop Test
News  |  8/21/2007  | 
Blue Lane Technologies successfully runs and evaluates protocol test cases at Microsoft's Enterprise Engineering Center
Sipera VIPER Tests for VOIP/UC Vulnerabilities
News  |  8/21/2007  | 
Sipera Systems announced the availability of Sipera VIPER Services
Google's Flawed Search for Security
News  |  8/21/2007  | 
Despite promises, search engine's security is for the birds
63% of Malware Distributed by US Sites
News  |  8/21/2007  | 
Cyveillance announced its latest 'Online Financial Fraud and Identity Theft Report'
Network Testing Labs Rates Mi5 Webgate
News  |  8/21/2007  | 
Mi5 Networks announced that its Webgate 009 has earned a World Class Award for Best Anti-Malware Gateway Device from Network Testing Labs
Whitedust Security Site Shuttered
News  |  8/20/2007  | 
Security portal quietly shuts down amid criticism, targeted attacks
ZyXEL Adds UTM Tool
News  |  8/20/2007  | 
Communications Inc. unveiled its new Unified Security Gateway product line with the ZyWALL USG300
Trend Micro IDs Top Security Threats in 2007
News  |  8/20/2007  | 
Trend Micro published the TrendLabs Semi-annual Threat Roundup and Forecast
A Storm of Human Error
News  |  8/20/2007  | 
Storm worm's proliferation proves that end users still have a lot of learning to do
F5 Selects Mu Security
News  |  8/20/2007  | 
Mu Security announced that F5 is deploying the Mu-4000 Security Analyzer
Trojan on Monster.com Steals Personal Data
News  |  8/20/2007  | 
Researcher discovers theft of more than 1.6 million pieces of personal data affecting 'several hundred thousand' users at recruiting sites
MarkMonitor: Phishers Increase 'Brandjacking'
News  |  8/20/2007  | 
MarkMonitor Brandjacking Index exposes online scams that threaten top pharmaceutical brands and hurt consumers
Page 1 / 3   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25288
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
CVE-2020-25781
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
CVE-2020-25830
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
CVE-2020-26159
PUBLISHED: 2020-09-30
In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .
CVE-2020-6654
PUBLISHED: 2020-09-30
A DLL Hijacking vulnerability in Eaton's 9000x Programming and Configuration Software v 2.0.38 and prior allows an attacker to execute arbitrary code by replacing the required DLLs with malicious DLLs when the software try to load vci11un6.DLL and cinpl.DLL.