Products and Releases

Latest Content
Page 1 / 2   >   >>
SAP Security Tool Now Enables Automated QA & Security Checks for SAPUI5
Products and Releases  |  4/18/2018
Virtual Forge now offers its CodeProfiler for HANA with support of SAPUI5.
RedLock Enhances Visibility, Compliance Assurance, and Threat Detection with Azure
Products and Releases  |  4/17/2018
Integration with Azure Network Watcher Enriches Context on Risks.
AlienVault Unveils Free Threat-Scanning Service for Endpoint Devices through Open Threat Exchange
Products and Releases  |  4/17/2018
OTX endpoint threat hunter delivers simple, fast threat visibility to assess business risk from malware and other threats.
Cylance Showcases AI Powered Endpoint Detection and Response Solution at RSA 2018 Conference
Products and Releases  |  4/16/2018
CylanceOPTICS takes endpoint detection and response to the next level with predictive machine learning models
Tripwire Debuts Early Access Program for Container Analyzer Service
Products and Releases  |  4/16/2018
Security solution expands vulnerability visibility across DevOps life cycle.
CrowdStrike Announces Real Time Response and Real Time Query to Help Organizations Get Back to Business Quickly After a Cyber Attack
Products and Releases  |  4/16/2018
Company enhances its endpoint detection and response (EDR) solution with Real-Time Response and Real-Time Query capabilities.
CrowdStrike Introduces New Automated Threat Analysis Solution to Deliver Predictive Security
Products and Releases  |  4/16/2018
CrowdStrike Falcon X automates threat analysis, delivering customized IOCs, intelligence and Next-Gen Security Operations Center (SOC) automation to large and small organizations alike.
CrowdStrike Announces Launch of Endpoint Protection Complete
Products and Releases  |  4/16/2018
CrowdStrike brings to market an instant, turnkey endpoint protection solution.
Cisco Doubles Down on Security Investment to Protect Endpoint and Email
Products and Releases  |  4/16/2018
Cisco introduces new email security services to more effectively prevent phishing and spoofing attacks.
Capsule8 Announces General Availability of Capsule8 1.0
Products and Releases  |  4/11/2018
Lyft among first to pursue Capsule8s Linux workload attack detection platform for both containerized and legacy environments.
Duo Security, Akamai Partner to Create Zero-Trust Ecosystem for Remote Workers
Products and Releases  |  4/11/2018
The solution eliminates the need for traditional remote user Virtual Private Networks (VPNs) and aims to improve security for organizations.
Container Security Pioneer StackRox Secures $25 Million in Series B Funding
Products and Releases  |  4/10/2018
Top-Tier VC Investments Enable the Leader in Security for Containerized Cloud-Native Applications to Advance Development, Sales and Marketing Efforts
Code42 Launches Forensic File Search
Products and Releases  |  4/10/2018
SafeBreach Expands Visa Partnership for Threat Intelligence Integration in Breach and Attack Simulation
Products and Releases  |  4/10/2018
Extension of Market First Capability Empowers Payment Industry Unparalleled Speed and Agility in Attack Prevention; Partnership on Display at RSA Conference 2018
Cybersecurity, IT Governance, Emerging Tech Shaping 2018 IT Audit Plans: Protiviti, ISACA
Products and Releases  |  4/6/2018
Technological changes give rise to new risks; drive demand for more advanced auditing technology, skills, knowledge and resources.
ThreatX Closes $8.2 Million Series A Funding Round
Products and Releases  |  4/4/2018
Investment to Accelerate Company Growth and Adoption of its Leading SaaS-based Web Application Firewall Platform
SpyCloud Secures $5 Million in Funding
Products and Releases  |  4/3/2018
The company solidifies plans for growth as account takeover prevention becomes an enterprise necessity.
Yubico and Duo Security Accelerate Federal Cybersecurity Modernization and Smart Card Replacement
Products and Releases  |  3/28/2018
Revisions to federal cybersecurity requirements open door for transition to modern and more effective methods to secure government data
Registration Open for U.S. Cyber Challenges Annual Cyber Quests Competition
Products and Releases  |  3/28/2018
Top Competitors to Qualify for Summer 2018 Cyber Camps
Report: Macro-less Word Document Attacks on the Rise, Zero Day Malware Variants Jump 167 Percent
Products and Releases  |  3/28/2018
WatchGuard Launches Threat Landscape visualization tool for analyzing Firebox Feed data to better understand security threats
Carbon Black Unveils Cb Integration Network, Delivering Cybersecurity via Open APIs
Products and Releases  |  3/28/2018
80+ technology partners have built more than 120 supported integrations by leveraging Carbon Blacks open APIs
ForgeRock Partners with Trusona to Bring #NoPasswords Authentication to Global Companies and Their Customers
Products and Releases  |  3/28/2018
Integration Introduces Frictionless Login Experience to Improve Customer Satisfaction, Increase Security and Decrease Costs
Companies with Secure Email to Gain Unlimited Free Brand Impressions
Products and Releases  |  3/27/2018
New BIMI Standard Puts Company Logos on Authentic Email Messages, Increasing Trust
XM Cyber Unveils First Automated APT Simulation Platform to Continuously Expose All Attack Vectors and Prioritize Actionable Remediation
Products and Releases  |  3/22/2018
Operating as a fully automated purple team, XM Cyber combines red and blue teaming processes to always stay ahead of the hacker
Cofense Malware Review Covers Trends and Predictions on Malware, Delivery Methods and Trending Attacks
Products and Releases  |  3/22/2018
Abuse of legitimate software, rapid exploitation of disclosed vulnerabilities and dynamic phishing techniques increase infection rates, according to the report
Tax Software Providers Not Protecting Emails from Phishing and Spoofing
Products and Releases  |  3/21/2018
Half of Top 8 Tax Software Providers Leave Consumers Vulnerable to Email-Borne Attacks That Can Lead to Identity and Bank Account Theft Customers of H&R Block, TaxAct, Turbo Tax and Free Tax USA Most Susceptible
Kaspersky Lab finds Prilex POS malware evolving to target chip and PIN-protected cards
Products and Releases  |  3/20/2018
The group behind the Prilex point-of-sale (POS) malware can now turn stolen credit card data into functional plastic cards according to the latest research from Kaspersky Labs.
UpGuard Launches Breachsight Breach Discovery Engine
Products and Releases  |  3/20/2018
Cyber risk company unveils solution to locate, analyze, and remediate data exposures
PCI SSC Announces Changes to Qualified Integrators and Resellers Program
Products and Releases  |  3/14/2018
The changes are designed to improve payment data security and reduce merchants' risk.
The Industrial Internet Consortium Releases the Endpoint Security Best Practices White Paper
Products and Releases  |  3/12/2018
Simplifies Guidance for Improving IIoT Endpoint Security
Cyberattacks Get Pricy: Growing Companies Turn to Outsourced Solutions
Products and Releases  |  3/7/2018
Arctic Wolf Networks Selected by Trusource Labs for SOC-as-a-Service.
Bandura Systems Closes $3.5 Million Seed Round
Products and Releases  |  3/7/2018
Company that pioneered Threat Intelligence Gateways for US government expands executive team, announces dual headquarters
Netskope Expands Commitment to Enterprise Security with New Office of the CSO
Products and Releases  |  3/1/2018
Industry veteran Jason Clark joins company to lead new team
Page 1 / 2   >   >>


8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.