Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in August 2007
Page 1 / 3   >   >>
Phishers Play Top 40
News  |  8/31/2007  | 
Latest spam pretends to be video from your favorite musical artist
Bimba Deploys Sidewinder
News  |  8/31/2007  | 
Secure Computing announced that Bimba Manufacturing has switched to the Sidewinder Network Gateway Security appliance
When Web Servers Attack
News  |  8/30/2007  | 
Even in a DMZ, a Web server can be a dangerous weapon
Comodo Intros Memory Guardian
News  |  8/30/2007  | 
Comodo introduces Memory Guardian to protect consumers against buffer overflow attacks
Korea Investigates Anti-Spyware Makers
News  |  8/30/2007  | 
Korean government asks police to look into 'anti-spyware' tools that actually spread spyware
Storm Hits Blogger
News  |  8/30/2007  | 
The ubiquitous Storm Trojan has found a new home - on spam blog sites in Google's Blogger network
On the Trail of 'Fast Flux' Botnets
News  |  8/29/2007  | 
Stealth botnet method makes botnets hard to kill, but not impossible
Consumers Concerned With Phishing
News  |  8/29/2007  | 
Cloudmark announced the results of a nationwide poll conducted on its behalf by Harris Interactive
PDF Spam Declines Sharply
News  |  8/29/2007  | 
'Is PDF spam simply not working for the spammers?' Sophos asks
Jordan's Furniture Selects Sophos
News  |  8/29/2007  | 
Jordan's Furniture selected Sophos Endpoint Security and Control
Enterprises Wrestle With Security Policies
News  |  8/28/2007  | 
Corporate security policies often are not enforced, according to newly-published survey by RSA and Forrester
'Dream Team' Takes on Black Hats
News  |  8/28/2007  | 
Feds, law enforcement, ISPs, and researchers pow-wow in closed meeting on how to catch the bad guys
Black Hat's Video Review
News  |  8/28/2007  | 
One-on-one interviews offer a new view on Black Hat's key issues
Promisec Helps SMEs Combat Security Threats
News  |  8/28/2007  | 
SMEs need to address internal threats, leverage automation to ensure highest levels of security and threat mitigation
IM Threats Spike Nearly 100% in August
News  |  8/28/2007  | 
Akonix IM Threat Watch tracks 38 attacks
Sophos: Don't Download That YouTube Video
News  |  8/28/2007  | 
New variation of Storm worm drops Ecard disguise for online movie masquerade
Merchant-Accounts.ca, Comodo Partner
News  |  8/28/2007  | 
Merchant-Accounts.ca and Comodo announce partnership to deliver PCI compliance and Web vulnerability scanning to Canadian customers
Symantec Launches Norton 2008
News  |  8/28/2007  | 
Symantec announced the launch of Norton Internet Security 2008 and Norton AntiVirus 2008
China's Premier 'Gravely Concerned' by Hack on Germany
News  |  8/27/2007  | 
Top-ranked officials discuss alleged cyber attack at diplomatic meeting
New Intel Processor Fights Rootkits, Virtualization Threats
News  |  8/27/2007  | 
But experts say new features still aren't true anti-rootkit technologies
Study: SMBs Overconfident in IT Security
News  |  8/27/2007  | 
According to Websense, SMBs fail to take adequate steps to reduce the risk off data loss from Web-based security threats
Anchiva Delivers 800,000 Signatures
News  |  8/27/2007  | 
Rapid RxLabs is now delivering over 800,000 signatures to detect and prevent malware from entering enterprise networks
Phishers in Microsoft's Clothing
News  |  8/24/2007  | 
Two new spam scams masquerade as official messages from top Microsoft officials
Red Curtain Reveals Malware
News  |  8/24/2007  | 
Free tool helps expose malicious software by its behavior
The Lost Companies
News  |  8/24/2007  | 
Security troubles lead to disappearance of two established organizations in two months
Hacking for Charity
News  |  8/23/2007  | 
New organization looking for a few good hackers to assist nonprofits - gratis
'Defenestration' Testing
News  |  8/23/2007  | 
Does your organization even know what secrets it's supposed to be keeping?
Crypto Makes the Grade at Baylor
News  |  8/23/2007  | 
University taps PGP to protect faculty, staff laptops - and to comply with state laws in the event of data loss
Eight Sure-Fire Ways to Beat a Security Audit
News  |  8/23/2007  | 
Experts share tips on how to avoid the most common pitfalls in an audit
Slammer, Other Older Threats Making a Comeback
News  |  8/23/2007  | 
Researchers at IBM ISS say Slammer is the most common network threat they see today due to 'retired' signatures
UK Plans Big Spend on ID Management
News  |  8/22/2007  | 
Public-sector spending will increase 50 percent in the next year alone, new study says
Hacking Germany's New Computer Crime Law
News  |  8/22/2007  | 
German and US researchers lay low, question just how far new law will go
Finding the Leaks in Leak Prevention
News  |  8/22/2007  | 
Data leak prevention tools may not be enough to stop determined bad apples
Bitdefender: Students Need Update
News  |  8/22/2007  | 
BitDefender warns college students about the need to protect their computers with the latest security software updates
Ukranian Suspect Could Help Break TJX Case
News  |  8/22/2007  | 
Details of the TJX hack begin to rapidly unfold thanks to a recent arrest
Beware of 'Confirmation Spam'
News  |  8/22/2007  | 
Marshal issues warning against new storm of 'confirmation spam'
Site Services Pay Damages for Bill-Doctoring
News  |  8/21/2007  | 
Website services put $24 million worth of unauthorized charges on customers' bills, FTC says
Cenzic Patent Case Worries Web Researchers, Vendors
News  |  8/21/2007  | 
Controversial patent could affect other Web app scanners, research
Blue Lane Passes Microsoft Interop Test
News  |  8/21/2007  | 
Blue Lane Technologies successfully runs and evaluates protocol test cases at Microsoft's Enterprise Engineering Center
Sipera VIPER Tests for VOIP/UC Vulnerabilities
News  |  8/21/2007  | 
Sipera Systems announced the availability of Sipera VIPER Services
Google's Flawed Search for Security
News  |  8/21/2007  | 
Despite promises, search engine's security is for the birds
63% of Malware Distributed by US Sites
News  |  8/21/2007  | 
Cyveillance announced its latest 'Online Financial Fraud and Identity Theft Report'
Network Testing Labs Rates Mi5 Webgate
News  |  8/21/2007  | 
Mi5 Networks announced that its Webgate 009 has earned a World Class Award for Best Anti-Malware Gateway Device from Network Testing Labs
Whitedust Security Site Shuttered
News  |  8/20/2007  | 
Security portal quietly shuts down amid criticism, targeted attacks
ZyXEL Adds UTM Tool
News  |  8/20/2007  | 
Communications Inc. unveiled its new Unified Security Gateway product line with the ZyWALL USG300
Trend Micro IDs Top Security Threats in 2007
News  |  8/20/2007  | 
Trend Micro published the TrendLabs Semi-annual Threat Roundup and Forecast
A Storm of Human Error
News  |  8/20/2007  | 
Storm worm's proliferation proves that end users still have a lot of learning to do
F5 Selects Mu Security
News  |  8/20/2007  | 
Mu Security announced that F5 is deploying the Mu-4000 Security Analyzer
Trojan on Monster.com Steals Personal Data
News  |  8/20/2007  | 
Researcher discovers theft of more than 1.6 million pieces of personal data affecting 'several hundred thousand' users at recruiting sites
MarkMonitor: Phishers Increase 'Brandjacking'
News  |  8/20/2007  | 
MarkMonitor Brandjacking Index exposes online scams that threaten top pharmaceutical brands and hurt consumers
Page 1 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26180
PUBLISHED: 2021-07-28
Dell EMC Isilon OneFS supported versions 8.1 and later and Dell EMC PowerScale OneFS supported version 9.0.0 contain an access issue with the remotesupport user account. A remote malicious user with low privileges may gain access to data stored on the /ifs directory through most protocols.
CVE-2020-5341
PUBLISHED: 2021-07-28
Deserialization of Untrusted Data Vulnerability Dell EMC Avamar Server versions 7.4.1, 7.5.0, 7.5.1, 18.2, 19.1 and 19.2 and Dell EMC Integrated Data Protection Appliance versions 2.0, 2.1, 2.2, 2.3, 2.4 and 2.4.1 contain a Deserialization of Untrusted Data Vulnerability. A remote unauthenticated ...
CVE-2020-5351
PUBLISHED: 2021-07-28
Dell EMC Data Protection Advisor versions 6.4, 6.5 and 18.1 contain an undocumented account with limited privileges that is protected with a hard-coded password. A remote unauthenticated malicious user with the knowledge of the hard-coded password may login to the system and gain read-only privilege...
CVE-2021-32788
PUBLISHED: 2021-07-27
Discourse is an open source discussion platform. In versions prior to 2.7.7 there are two bugs which led to the post creator of a whisper post being revealed to non-staff users. 1: Staff users that creates a whisper post in a personal message is revealed to non-staff participants of the personal mes...
CVE-2021-32796
PUBLISHED: 2021-07-27
xmldom is an open source pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module. xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes durin...