Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/26/2017
08:00 AM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

8 Most Overlooked Security Threats

Businesses know the obvious security threats to watch for, but some of the biggest dangers may not at top-of-mind.
1 of 9

1 of 9
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
5/30/2017 | 12:23:02 PM
Undereducated employees
 

This is more critical one I would say.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
5/30/2017 | 12:22:37 PM
Re: Awareness training
"when hackers are focusing on people more than ever"

Agree. It becomes more human hacking than machine.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2017 | 12:21:17 PM
Re: Malvertising
"Yet another reason to disable/block Flash, Java, and HTML5 on all but the most trusted of sites."

HTML5? Then no sites could run on any browsers, correct?
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2017 | 12:19:39 PM
Re: 8 Most Overlooked Security Threats
How would they fare with z/OS, Linux and Unix??

I say the same way, it is not about OS, there is always vulnerabilities in all OSes.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2017 | 12:17:53 PM
Re: 8 Most Overlooked Security Threats
"The reent Wanna Cry attcaks immobilised large parts of Britain's NHS and it is apparent they did not have a DR plan rto revocover"

Agree. That is becoming major issue, if there is nothing to fall back it is downtime obviously. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/30/2017 | 11:54:32 AM
Evil maid
This is most likely a common one that we are not that much aware of.
LindsayCybSafe
50%
50%
LindsayCybSafe,
User Rank: Strategist
5/30/2017 | 6:57:40 AM
Awareness training
Interesting how many of the overlooked security threats come down to No. 8 - employee awareness. Mobilisation, IoT, in-memory phishing attacks push the ball into the court of employees and their devices...a disproportionate focus technology is happening, when hackers are focusing on people more than ever.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/29/2017 | 9:06:24 PM
Malvertising
Worth noting that malvertising has also been used to deliver malware.

Yet another reason to disable/block Flash, Java, and HTML5 on all but the most trusted of sites.
tcritchley07
100%
0%
tcritchley07,
User Rank: Moderator
5/26/2017 | 5:58:54 PM
8 Most Overlooked Security Threats
Interestng article but there is a 90 degree view of this which is disaster recovery when the attack actually works.

The reent Wanna Cry attcaks immobilised large parts of Britain's NHS and it is apparent they did not have a DR plan rto revocover. Moving on, and thinking laterally, there is a case for scrapping the use of Windows in many cases as the bad guys are obviously very proficient in this area. How would they fare with z/OS, Linux and Unix??

Just a few thoughts out of the box.
<<   <   Page 2 / 2
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13991
PUBLISHED: 2020-09-24
vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register.
CVE-2020-15160
PUBLISHED: 2020-09-24
PrestaShop from version 1.7.5.0 and before version 1.7.6.8 is vulnerable to a blind SQL Injection attack in the Catalog Product edition page with location parameter. The problem is fixed in 1.7.6.8
CVE-2020-15162
PUBLISHED: 2020-09-24
In PrestaShop from version 1.5.0.0 and before version 1.7.6.8, users are allowed to send compromised files. These attachments allowed people to input malicious JavaScript which triggered an XSS payload. The problem is fixed in version 1.7.6.8.
CVE-2020-15843
PUBLISHED: 2020-09-24
ActFax Version 7.10 Build 0335 (2020-05-25) is susceptible to a privilege escalation vulnerability due to insecure folder permissions on %PROGRAMFILES%\ActiveFax\Client\, %PROGRAMFILES%\ActiveFax\Install\ and %PROGRAMFILES%\ActiveFax\Terminal\. The folder permissions allow &quot;Full Control&quot; t...
CVE-2020-17365
PUBLISHED: 2020-09-24
Improper directory permissions in the Hotspot Shield VPN client software for Windows 10.3.0 and earlier may allow an authorized user to potentially enable escalation of privilege via local access. The vulnerability allows a local user to corrupt system files: a local user can create a specially craf...