ATENTIONβΌ New - CVE-2010-0398 (autokey)
π Read
via "National Vulnerability Database".
The init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.π Read
via "National Vulnerability Database".
β Office for Mac 2011 users warned about SYLK file format β
π Read
via "Naked Security".
Still running Office 2011 on a Mac? If so, there are at least two reasons why that might not be a good idea.π Read
via "Naked Security".
Naked Security
Office for Mac 2011 users warned about SYLK file format
Still running Office 2011 on a Mac? If so, there are at least two reasons why that might not be a good idea.
π΄ Proofpoint Acquires ObserveIT to Bolster DLP Capabilities π΄
π Read
via "Dark Reading: ".
The $225 million acquisition will help Proofpoint expand its data loss prevention capabilities with email, CASB, and data at rest.π Read
via "Dark Reading: ".
Dark Reading
Proofpoint Acquires ObserveIT to Bolster DLP Capabilities
The $225 million acquisition will help Proofpoint expand its data loss prevention capabilities with email, CASB, and data at rest.
π How Microsoft and Digital Guardian Help Protect Your Sensitive Data π
π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian, through its integration with Microsoft Information Protection, helps enrich Microsoftβs data loss prevention capabilities.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
How Microsoft and Digital Guardian Help Protect Your Sensitive Data
Digital Guardian, through its integration with Microsoft, helps extend the value of Microsoft Information Protection capabilities.
π How boot camps may fill the need for more white hats in the US π
π Read
via "Security on TechRepublic".
New study: 3 in 5 have experienced discrimination in the workplaceπ Read
via "Security on TechRepublic".
TechRepublic
How boot camps may fill the need for more white hats in the US
New study: 3 in 5 have experienced discrimination in the workplace
π How boot camps may fill the need for more white hats in the US π
π Read
via "Security on TechRepublic".
Cyberspace is the fifth domain of warfare, yet there is a critical shortage of security experts ready to combat cybercrime.π Read
via "Security on TechRepublic".
TechRepublic
How boot camps may fill the need for more white hats in the US
Cyberspace is the fifth domain of warfare, yet there is a critical shortage of security experts ready to combat cybercrime.
π΄ The State of Email Security and Protection π΄
π Read
via "Dark Reading: ".
Phishing and ransomware top the list of security risks that organizations are not fully prepared to deal with.π Read
via "Dark Reading: ".
Darkreading
The State of Email Security and Protection
Phishing and ransomware top the list of security risks that organizations are not fully prepared to deal with.
π΄ 10 Tips for Building Compliance by Design into Cloud Architecture π΄
π Read
via "Dark Reading: ".
A pair of experts pass along lessons learned while building out the team and processes necessary to support Starbucks' mobile app.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
π΄ Disclosure Does Little to Dissuade Cyber Spies π΄
π Read
via "Dark Reading: ".
In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to switch to new infrastructure and continue operations.π Read
via "Dark Reading: ".
Darkreading
Disclosure Does Little to Dissuade Cyber Spies
In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to switch to new infrastructure and continue operations.
π΄ The Edge Cartoon Contest: Need a Lift? π΄
π Read
via "Dark Reading: ".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading: ".
Dark Reading
The Edge
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
π΄ Google Launches OpenTitan Project to Open Source Chip Security π΄
π Read
via "Dark Reading: ".
OpenTitan is an open source collaboration among Google and technology companies to strengthen root-of-trust chip design.π Read
via "Dark Reading: ".
Dark Reading
Google Launches OpenTitan Project to Open Source Chip Security
OpenTitan is an open source collaboration among Google and technology companies to strengthen root-of-trust chip design.
ATENTIONβΌ New - CVE-2010-2222
π Read
via "National Vulnerability Database".
The _ger_parse_control function in Red Hat Directory Server 8 and the 389 Directory Server allows attackers to cause a denial of service (NULL pointer dereference) via a crafted search query.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2010-2064 (rpcbind)
π Read
via "National Vulnerability Database".
rpcbind 0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2010-2061 (rpcbind)
π Read
via "National Vulnerability Database".
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2005-2354
π Read
via "National Vulnerability Database".
Nvu 0.99+1.0pre uses an old copy of Mozilla XPCOM which can result in multiple security issues.π Read
via "National Vulnerability Database".
π΄ CrowdStrike Adds New Products & Web Store Apps π΄
π Read
via "Dark Reading: ".
Company introduces Falcon for AWS, Falcon Firewall Management, and third-party applications.π Read
via "Dark Reading: ".
Dark Reading
CrowdStrike Adds New Products & Web Store Apps
Company introduces Falcon for AWS, Falcon Firewall Management, and third-party applications.
π΄ Siemens PLC Feature Can Be Exploited for Evil - and for Good π΄
π Read
via "Dark Reading: ".
A hidden feature in some newer models of the vendor's programmable logic controllers leaves the devices open to attack. Siemens says it plans to fix it.π Read
via "Dark Reading: ".
Dark Reading
Siemens PLC Feature Can Be Exploited for Evil - and for Good
A hidden feature in some newer models of the vendor's programmable logic controllers leaves the devices open to attack. Siemens says it plans to fix it.
ATENTIONβΌ New - CVE-2007-2841
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-3947. Reason: This candidate is a reservation duplicate of CVE-2007-3947. Notes: All CVE users should reference CVE-2007-3947 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2007-0899
π Read
via "National Vulnerability Database".
There is a possible heap overflow in libclamav/fsg.c before 0.100.0.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2006-4245
π Read
via "National Vulnerability Database".
archivemail 0.6.2 uses temporary files insecurely leading to a possible race condition.π Read
via "National Vulnerability Database".