Products and Releases

Content posted in January 2017
PCI SECURITY STANDARDS COUNCIL ISSUES BEST PRACTICES FOR SECURING E-COMMERCE
Products and Releases  |  1/31/2017  | 
E-commerce Security More Important Than Ever For Merchants
Illumio Brings Adaptive Segmentation to Cisco, Arista, AWS, and Azure
Products and Releases  |  1/31/2017  | 
Cybersecurity leader now programs security policy into leading infrastructure players.
94 Percent of CISOs Concerned About Publicly Facing Asset Breaches in 2017
Products and Releases  |  1/31/2017  | 
Todays AppSec teams facing resourcing issues that are making them vulnerable.
Arctic Wolf Networks Survey Reveals Mid-Market Cybersecurity Dissonance: Highlights Disparity Between Perception vs. Reality
Products and Releases  |  1/30/2017  | 
Half of respondents say they dont know where to start to improve security posture
IBM acquires Agile 3
Products and Releases  |  1/26/2017  | 
Expansion of Capabilities for IBM Guardium and Data Security Services
Launch of Breakthrough Iris and Face Recognition System
Products and Releases  |  1/26/2017  | 
Combination of performance and design to enable next generation of multimodal biometric applications in travel, identity, and access
Wanted: Women in Cybersecurity
Products and Releases  |  1/26/2017  | 
Raytheon and Center for Cyber Safety and Education expand cybersecurity scholarships for women
How to Stay Truly Anonymous Online in 2017
Products and Releases  |  1/26/2017  | 
NordVPN gives advice on how to enhance your anonymity online.
HackerOne Expands Hacker Education, Acquires Web Security Training Startup
Products and Releases  |  1/24/2017  | 
HackerOne adds new free-to-use online training curriculum for ethical hackers to make the internet safer.
Businesses See High Levels Of Fraud And Risk Incidents In 2016
Products and Releases  |  1/20/2017  | 
82% of executives surveyed worldwide experienced a fraud incident in the past year compared to 75% in 2015, according to the Kroll Annual Global Fraud and Risk Report
Strategic Cyber Ventures Invests $3M in ID DataWeb
Products and Releases  |  1/20/2017  | 
New funding will allow dynamic identity verification firm to further innovate its technology and expand growth and sales in new markets


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11311
PUBLISHED: 2018-05-20
A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.
CVE-2018-11319
PUBLISHED: 2018-05-20
Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to ...
CVE-2018-11242
PUBLISHED: 2018-05-20
An issue was discovered in the MakeMyTrip application 7.2.4 for Android. The databases (locally stored) are not encrypted and have cleartext that might lead to sensitive information disclosure, as demonstrated by data/com.makemytrip/databases and data/com.makemytrip/Cache SQLite database files.
CVE-2018-11315
PUBLISHED: 2018-05-20
The Local HTTP API in Radio Thermostat CT50 and CT80 1.04.84 and below products allows unauthorized access via a DNS rebinding attack. This can result in remote device temperature control, as demonstrated by a tstat t_heat request that accesses a device purchased in the Spring of 2018, and sets a ho...
CVE-2018-11239
PUBLISHED: 2018-05-19
An integer overflow in the _transfer function of a smart contract implementation for Hexagon (HXG), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets by providing a _to argument in conjunction with a large _value argument, as exploited in the wild in ...