Products and Releases

Latest Content
<<   <   Page 2 / 2
Varonis Announces Interoperability with RSA Identity Governance and Lifecycle
Products and Releases  |  9/12/2018  | 
Interoperability enables detection and mitigation of security risks by providing centralized management and control of sensitive data
ThreatConnect Now Integrates with Dragos Worldview Intelligence
Products and Releases  |  9/11/2018  | 
Security teams can act efficiently to identify malicious actors targeting worldwide industrial networks
Corelight Secures $25 Million in Series B Funding Led by General Catalyst
Products and Releases  |  9/11/2018  | 
Former VMware CTO Steve Herrod joins board as Corelight continues to build momentum with its leading network visibility platform
Global Report Card Survey Reveals Cybersecurity Program Trends Since 2017
Products and Releases  |  9/11/2018  | 
GPAs are on the rise with security pros feeling more confident than ever before; Automation and training are key to getting an A grade.
SecurityMatters Announces ICS Patrol for Network Visibility, Compliance and Control
Products and Releases  |  9/10/2018  | 
SecurityMatters ICS Patrol advances operational management and cybersecurity for critical infrastructure by providing asset visibility for enterprise-grade deployments.
Proofpoint Launches Closed-Loop Email Analysis and Response Solution to Automate End User-Reported Phishing Remediation
Products and Releases  |  9/6/2018  | 
Reduces threat triage time of end user-reported malicious emails
Andreessen Horowitz Leads $8.5 Million Investment in Very Good Security
Products and Releases  |  8/30/2018  | 
VGS is a modern approach to data security enabling companies to build secure products without compromising safety or compliance
OWASP Announces Lineup for AppSec USA 2018 Conference
Products and Releases  |  8/30/2018  | 
Industry conference bridges gap between cybersecurity and developer teams to protect digital applications with hands-on application security training sessions and panels
Nearly Half of Businesses Report an Unrecoverable Data Event in the Last Three Years: Study
Products and Releases  |  8/27/2018  | 
Research highlights gap between companies aspirations to modernize and a lack of maturity regarding the resilience of IT systems.
Trend Micro Research Launches New Program to Help IoT Device Makers
Products and Releases  |  8/22/2018  | 
ZDIs vulnerability detection offers chance to combat connected device flaws.
Fortanix Flexible Key Management Service Addresses Critical Enterprise Blockchain Security Requirements with Unique Private Key Protection
Products and Releases  |  8/22/2018  | 
Fortanix self-defending key management service delivers new encryption-based data protection and enhanced cryptographic algorithms to help address blockchain security gaps
Semmle Launches Globally with $21 Million Series B Investment Led by Accel Partners
Products and Releases  |  8/21/2018  | 
Google, Microsoft, NASA and Nasdaq use Semmles software engineering analytics to secure the software that runs the world
Surfshark Launches Lightweight VPN App for iOS Devices
Products and Releases  |  8/20/2018  | 
The new app uses the latest encryption technology for speed, security, and longer battery life
Exabeam Raises $50 Million in Series D Funding
Products and Releases  |  8/20/2018  | 
Funding round led by Lightspeed Venture Partners
FireEye Cautions Malaysian Firms of Heightened Cyber Risk
Products and Releases  |  8/20/2018  | 
Malaysias political shift and Belt & Road links lead to heightened interest from state- linked cyber threat actors: FireEye intelligence head.
SafeBreach Extends Breach and Attack Simulation Platform
Products and Releases  |  8/20/2018  | 
New Capabilities Expand Coverage from Email-to-Endpoint; Also Adds Enhanced Remediation Support and Board Level Risk Scoring
4th Annual Global Cybersecurity Forum, HackIT 4.0: Exploit Blockchain will be held October 8 11 in Kyiv, Ukraine
Products and Releases  |  8/17/2018  | 
Annual Hacken Cup, one day, onsite bug bounty marathon on October 8
Exabeam Raises $50 Million in Series D, Targets SIEM Market
Products and Releases  |  8/14/2018  | 
Funding round led by Lightspeed Venture Partners; two years of growth at Exabeam highlights demand for an alternative to failing legacy SIEM solutions.
Gigamon and Endace Partner to Provide Complete Visibility Into Network Traffic for Performance and Security Analytics
Products and Releases  |  8/14/2018  | 
Partnership enables speedy, conclusive investigation for network security threats and performance issues
Imperva Completes the Acquisition of Prevoty
Products and Releases  |  8/14/2018  | 
Spam and Phishing in Q2: Financial sector customers top targets of phishing attacks
Products and Releases  |  8/14/2018  | 
Kaspersky Labs quarterly analysis finds banks, e-shops and payment systems attacked most by phishers
Venafi Study: 93% of Security Professionals Say Election Infrastructure Is at Risk
Products and Releases  |  8/14/2018  | 
Eighty-one percent believe cyber attackers will target machine communications from local polling stations to central aggregation points
Faxploit: Attackers Use Fax Machines to Take over Networks, Spread Malware, Check Point Finds
Products and Releases  |  8/13/2018  | 
Newly discovered vulnerabilities affecting tens of millions of fax devices in businesses and homes worldwide open the door for criminals to hack networks simply by sending malicious faxes
Digital Guardian Releases New User and Entity Behavior Analytics Capability
Products and Releases  |  8/7/2018  | 
Delivers advanced analytics and anomaly-based detection to give deeper insight into suspicious activities surrounding sensitive data.
Qualys Adds Native Integration of Real-Time Network Analysis to Cloud Platform
Products and Releases  |  8/7/2018  | 
Passive Network Sensor will be available in private beta later this month.
Digital Guardian Releases New Managed Security Program for Endpoint Detection and Response
Products and Releases  |  8/7/2018  | 
Program provides protection from both insider threats as well as external attackers.
Qualys Introduces Out-of-Band Configuration Assessment
Products and Releases  |  8/7/2018  | 
New Qualys Cloud Platform extension allows customers to get full visibility of security and compliance posture across inaccessible, sensitively located assets.
Spirent Extends CyberFlood with Data Breach Emulation for Security Testing of Networks and Devices
Products and Releases  |  8/7/2018  | 
CyberFlood Data Breach Assessment uses actual attack components, hacker activity, and malware executables to assess an organizations vulnerability to cybercrime.
ShiftLeft Demonstrates Application Protection During 14-Day Pen Test
Products and Releases  |  8/7/2018  | 
Test measured ShiftLeft's ability to protect a vulnerable application against exploit attempts made by white-hat hackers.
wolfSSL Announces Commercial Release of TLS 1.3
Products and Releases  |  8/7/2018  | 
Newest version of TLS cryptography specification reduces number of roundtrips when performing a full handshake.
TruSTAR to Unveil Blockchain Research Tool at Black Hat Arsenal and DEF CON Recon Village 2018
Products and Releases  |  8/6/2018  | 
Early warning system for emerging ransomware campaigns monitors Bitcoin (BTC) transaction data.
Securonix Announces AI-based Tech to Drive Security Operation Center Efficiency
Products and Releases  |  8/3/2018  | 
Advanced AI is intended to help security analysts respond faster to cybersecurity alerts across cloud and hybrid architectures.
Preempt Tackles Reconnaissance Tools Used by Hackers
Products and Releases  |  8/2/2018  | 
HYAS Raises $6.2M Series A Round Led By M12
Products and Releases  |  8/2/2018  | 
Retail Cyber Intelligence Sharing Center (R-CISC) Forms Advisory Council
Products and Releases  |  8/1/2018  | 
The council brings together members of the merchant community to provide education on cybersecurity issues facing the industries. The councils inaugural meeting was held in Washington, DC, in June.
Research Reveals Major Insider Threat Disconnect in the Workplace: ObserveIT
Products and Releases  |  8/1/2018  | 
Majority of respondents say they understand the definition of an insider threat, but data shows the insider threat risk is growing rapidly.
FireEye Brings Machine Learning to Endpoint Security with MalwareGuard
Products and Releases  |  7/31/2018  | 
New FireEye machine learning capabilities are trained on real-world data from the front lines to identify and block emerging threats targeting the endpoint.
<<   <   Page 2 / 2


New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19406
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
CVE-2018-19407
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
CVE-2018-19404
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&amp;url= ...
CVE-2018-19387
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
CVE-2018-19388
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.