SQLi found in Kodak Insite
While investigating a recent installation of Kodak's Insite CreativeWorkflow System (for my current employer), an SQL Injection vulnerabilitywas discovered in its "Forgot Your Password?" page.An...
View ArticleApplication Control: the key to a secure network. Part 1
IntroductionCorporate network security is one of the most pressing issues for companies today. Malicious programs can cause substantial harm to a business, and a firm’s reputation is not the least of...
View ArticleCloudeAssurance Releases Its First Independent Cloud Security Benchmark Study...
Report enables cloud consumers to evaluate which cloud providers have the best cloud assurance score and history, a measure of cloud trust on which they can depend. ATLANTA, Feb. 20, 2013...
View ArticleCenzic Enterprise Integrates with F5 BIG-IP ASM to Deliver Next Generation...
Integrating Cenzic Enterprise Enables F5 Customers to Instantly Scan, Review and Mitigate Vulnerabilities across Web, Cloud and Mobile EnvironmentsSAN FRANCISCO, Feb. 20, 2013 /PRNewswire/ -- Cenzic...
View ArticleSalient Federal Solutions and CloudShield® Deliver Solution to Address...
Companies to Debut a Joint Solution featuring Salient Assure6™ on the CloudShield CS-4000 Trusted Cyber Platform for Comprehensive, Next-Generation IPv6 Security at 2013 RSA Conference FAIRFAX,...
View ArticleCommtouch Reports Fourth Quarter and Full Year 2012 Results
MCLEAN, Virginia, February 20, 2013 /PRNewswire/ --Fourth Quarter 2012 Revenues of $6.8 Million, Up 22% Sequentially, Up 14% Versus a Year AgoFull Year 2012 Revenues of $23.9 Million, Up 4%...
View ArticleXSS vulnerabilities in YAML, Multiproject for Trac, UserCollections for...
These are Cross-Site Scripting vulnerabilities in YAML, MultiProjectextension for Trac, UserCollections extension for Piwigo, TAO and TableToolsplugin for DataTables plugin for jQuery (with...
View Article[ MDVSA-2013:013 ] squid
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:013http://www.mandriva.com/security/...
View Articlenew scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus...
This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== OpenVAS plugins (3) ==r15474 803171...
View ArticleThreat Outbreak Alert: Fake Portugues Language Bank Deposit Notification...
DescriptionCisco Security Intelligence Operations has detected significant activity related to Portuguese-language spam e-mail messages that claim to contain a bank deposit notification for the...
View ArticleThreat Outbreak Alert: Fake Rejected Tax Form Notification E-mail Messages
DescriptionCisco Security Intelligence Operations has detected significant activity related to spam e-mail messages that claim to contain a copy of a tax form notification related to a tax payment...
View ArticleCustomizable, Python-Based Vulnerability Rules Now Available in nCircle IP360™
New capability expands nCircle’s custom vulnerability rule editing and creation toolsetSAN FRANCISCO--(BUSINESS WIRE)--nCircle, the leader in information risk and security performance management...
View ArticleWorld Wide Technology Strengthens its Enterprise Storage Solutions Portfolio...
WWT Will Leverage More Than 20 Years of NetApp Technology Innovation to Deliver Maximum Efficiency, Reliability and Performance for its Customers' Most Demanding Latency-Sensitive ApplicationsST....
View ArticleRed Hat Unveils Big Data and Open Hybrid Cloud Direction
Red Hat to Contribute Red Hat Storage Hadoop Plug-in to Apache Hadoop CommunityRALEIGH, N.C.--(BUSINESS WIRE)--Red Hat, Inc., the world’s leading provider of open source solutions, today announced its...
View ArticleForgeRock Releases New Version of Open Identity Stack
Updated Stack transforms and simplifies identity and access management to protect public cloud, private cloud, hybrid cloud, SaaS, and enterprise environmentsSAN FRANCISCO--(BUSINESS WIRE)--ForgeRock...
View ArticleIntroducing PingTone MobileLink
New PingTone Smartphone application enables better management of mobile workforceHERNDON, Va.--(BUSINESS WIRE)--MobileLink, PingTone’s new smartphone application built with the mobile employee in mind,...
View ArticleSymplified Releases New Research on Identity-as-a-Service
Security is Top Reason for Adopting IAM and SSO as Application and Identity Management Increases, Yet Data Exposure and Compliance Issues are PervasiveBOULDER, Colo.--(BUSINESS WIRE)--Security is the...
View ArticleIndependent Georgia Tech Study Reveals Best Ways to Tell Customers "You're...
SAN FRANCISCO, CA--(Marketwire - Feb 20, 2013) - A bot believed to have netted $14 million in illicit profits has been turned into a golden learning opportunity, yielding important insights into how...
View Article[SECURITY] [DSA 2630-1] postgresql-8.4 security update
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1- -------------------------------------------------------------------------Debian Security Advisory DSA-2630-1...
View ArticleJava 7u11 Exploit Source Code
/** From Paunch with love (Java 1.7.0_11 Exploit)* * Deobfuscated from Cool EK by SecurityObscurity** https://twitter.com/SecObscurity*/import java.applet.Applet;import...
View Article