Products and Releases

Latest Content
Page 1 / 2   >   >>
Verizon Digital Media Services adds managed security services to its cloud solution for enterprises
Products and Releases  |  9/24/2018  | 
New offering is available as part of a suite of security services including a dual web application firewall, DDoS protection, bot management, and real-time analytics and reporting.
CrowdStrike and Secureworks Form Partnership to Integrate Secureworks Red Cloak Behavioral Analytics with CrowdStrikes Endpoint Protection Platform
Products and Releases  |  9/17/2018  | 
CrowdStrike signs on as an inaugural participant in Secureworks new Red Cloak Partner Program
World-renowned Cybersecurity Veteran Richard Bejtlich Joins Corelight as Principal Security Strategist
Products and Releases  |  9/13/2018  | 
Bejtlich brings key industry perspectives and insights on network visibility and data-centric security that will help Corelight customers, and drive sales and product development strategy
Appdome Releases Two New Mobile App Security Protections
Products and Releases  |  9/12/2018  | 
New industry-first capabilities protection mobile communications & the underlying mobile app
Varonis Announces Interoperability with RSA Identity Governance and Lifecycle
Products and Releases  |  9/12/2018  | 
Interoperability enables detection and mitigation of security risks by providing centralized management and control of sensitive data
ThreatConnect Now Integrates with Dragos Worldview Intelligence
Products and Releases  |  9/11/2018  | 
Security teams can act efficiently to identify malicious actors targeting worldwide industrial networks
Corelight Secures $25 Million in Series B Funding Led by General Catalyst
Products and Releases  |  9/11/2018  | 
Former VMware CTO Steve Herrod joins board as Corelight continues to build momentum with its leading network visibility platform
Global Report Card Survey Reveals Cybersecurity Program Trends Since 2017
Products and Releases  |  9/11/2018  | 
GPAs are on the rise with security pros feeling more confident than ever before; Automation and training are key to getting an A grade.
SecurityMatters Announces ICS Patrol for Network Visibility, Compliance and Control
Products and Releases  |  9/10/2018  | 
SecurityMatters ICS Patrol advances operational management and cybersecurity for critical infrastructure by providing asset visibility for enterprise-grade deployments.
Proofpoint Launches Closed-Loop Email Analysis and Response Solution to Automate End User-Reported Phishing Remediation
Products and Releases  |  9/6/2018  | 
Reduces threat triage time of end user-reported malicious emails
Andreessen Horowitz Leads $8.5 Million Investment in Very Good Security
Products and Releases  |  8/30/2018  | 
VGS is a modern approach to data security enabling companies to build secure products without compromising safety or compliance
OWASP Announces Lineup for AppSec USA 2018 Conference
Products and Releases  |  8/30/2018  | 
Industry conference bridges gap between cybersecurity and developer teams to protect digital applications with hands-on application security training sessions and panels
Nearly Half of Businesses Report an Unrecoverable Data Event in the Last Three Years: Study
Products and Releases  |  8/27/2018  | 
Research highlights gap between companies aspirations to modernize and a lack of maturity regarding the resilience of IT systems.
Trend Micro Research Launches New Program to Help IoT Device Makers
Products and Releases  |  8/22/2018  | 
ZDIs vulnerability detection offers chance to combat connected device flaws.
Fortanix Flexible Key Management Service Addresses Critical Enterprise Blockchain Security Requirements with Unique Private Key Protection
Products and Releases  |  8/22/2018  | 
Fortanix self-defending key management service delivers new encryption-based data protection and enhanced cryptographic algorithms to help address blockchain security gaps
Semmle Launches Globally with $21 Million Series B Investment Led by Accel Partners
Products and Releases  |  8/21/2018  | 
Google, Microsoft, NASA and Nasdaq use Semmles software engineering analytics to secure the software that runs the world
Surfshark Launches Lightweight VPN App for iOS Devices
Products and Releases  |  8/20/2018  | 
The new app uses the latest encryption technology for speed, security, and longer battery life
Exabeam Raises $50 Million in Series D Funding
Products and Releases  |  8/20/2018  | 
Funding round led by Lightspeed Venture Partners
FireEye Cautions Malaysian Firms of Heightened Cyber Risk
Products and Releases  |  8/20/2018  | 
Malaysias political shift and Belt & Road links lead to heightened interest from state- linked cyber threat actors: FireEye intelligence head.
SafeBreach Extends Breach and Attack Simulation Platform
Products and Releases  |  8/20/2018  | 
New Capabilities Expand Coverage from Email-to-Endpoint; Also Adds Enhanced Remediation Support and Board Level Risk Scoring
4th Annual Global Cybersecurity Forum, HackIT 4.0: Exploit Blockchain will be held October 8 11 in Kyiv, Ukraine
Products and Releases  |  8/17/2018  | 
Annual Hacken Cup, one day, onsite bug bounty marathon on October 8
Exabeam Raises $50 Million in Series D, Targets SIEM Market
Products and Releases  |  8/14/2018  | 
Funding round led by Lightspeed Venture Partners; two years of growth at Exabeam highlights demand for an alternative to failing legacy SIEM solutions.
Gigamon and Endace Partner to Provide Complete Visibility Into Network Traffic for Performance and Security Analytics
Products and Releases  |  8/14/2018  | 
Partnership enables speedy, conclusive investigation for network security threats and performance issues
Imperva Completes the Acquisition of Prevoty
Products and Releases  |  8/14/2018  | 
Spam and Phishing in Q2: Financial sector customers top targets of phishing attacks
Products and Releases  |  8/14/2018  | 
Kaspersky Labs quarterly analysis finds banks, e-shops and payment systems attacked most by phishers
Venafi Study: 93% of Security Professionals Say Election Infrastructure Is at Risk
Products and Releases  |  8/14/2018  | 
Eighty-one percent believe cyber attackers will target machine communications from local polling stations to central aggregation points
Faxploit: Attackers Use Fax Machines to Take over Networks, Spread Malware, Check Point Finds
Products and Releases  |  8/13/2018  | 
Newly discovered vulnerabilities affecting tens of millions of fax devices in businesses and homes worldwide open the door for criminals to hack networks simply by sending malicious faxes
Digital Guardian Releases New User and Entity Behavior Analytics Capability
Products and Releases  |  8/7/2018  | 
Delivers advanced analytics and anomaly-based detection to give deeper insight into suspicious activities surrounding sensitive data.
Qualys Adds Native Integration of Real-Time Network Analysis to Cloud Platform
Products and Releases  |  8/7/2018  | 
Passive Network Sensor will be available in private beta later this month.
Digital Guardian Releases New Managed Security Program for Endpoint Detection and Response
Products and Releases  |  8/7/2018  | 
Program provides protection from both insider threats as well as external attackers.
Qualys Introduces Out-of-Band Configuration Assessment
Products and Releases  |  8/7/2018  | 
New Qualys Cloud Platform extension allows customers to get full visibility of security and compliance posture across inaccessible, sensitively located assets.
Spirent Extends CyberFlood with Data Breach Emulation for Security Testing of Networks and Devices
Products and Releases  |  8/7/2018  | 
CyberFlood Data Breach Assessment uses actual attack components, hacker activity, and malware executables to assess an organizations vulnerability to cybercrime.
ShiftLeft Demonstrates Application Protection During 14-Day Pen Test
Products and Releases  |  8/7/2018  | 
Test measured ShiftLeft's ability to protect a vulnerable application against exploit attempts made by white-hat hackers.
wolfSSL Announces Commercial Release of TLS 1.3
Products and Releases  |  8/7/2018  | 
Newest version of TLS cryptography specification reduces number of roundtrips when performing a full handshake.
TruSTAR to Unveil Blockchain Research Tool at Black Hat Arsenal and DEF CON Recon Village 2018
Products and Releases  |  8/6/2018  | 
Early warning system for emerging ransomware campaigns monitors Bitcoin (BTC) transaction data.
Securonix Announces AI-based Tech to Drive Security Operation Center Efficiency
Products and Releases  |  8/3/2018  | 
Advanced AI is intended to help security analysts respond faster to cybersecurity alerts across cloud and hybrid architectures.
Preempt Tackles Reconnaissance Tools Used by Hackers
Products and Releases  |  8/2/2018  | 
HYAS Raises $6.2M Series A Round Led By M12
Products and Releases  |  8/2/2018  | 
Page 1 / 2   >   >>


WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-8298
PUBLISHED: 2018-09-24
Multiple SQL injection vulnerabilities in the login page in RXTEC RXAdmin UPDATE 06 / 2012 allow remote attackers to execute arbitrary SQL commands via the (1) loginpassword, (2) loginusername, (3) zusatzlicher, or (4) groupid parameter to index.htm, or the (5) rxtec cookie to index.htm.
CVE-2018-14825
PUBLISHED: 2018-09-24
A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable...
CVE-2018-17437
PUBLISHED: 2018-09-24
Memory leak in the H5O_dtype_decode_helper() function in H5Odtype.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file.
CVE-2018-17438
PUBLISHED: 2018-09-24
A SIGFPE signal is raised in the function H5D__select_io() of H5Dselect.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack.
CVE-2018-17439
PUBLISHED: 2018-09-24
An issue was discovered in the HDF HDF5 1.10.3 library. There is a stack-based buffer overflow in the function H5S_extent_get_dims() in H5S.c. Specifically, this issue occurs while converting an HDF5 file to a GIF file.