Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in January 2021
Uniphore Unveils Technologies to Strengthen Both Agent and Customer Experiences in the Contact Center
Products and Releases  |  1/29/2021  | 
New RPA and Agent Security Solutions Set a New Standard for Customer Service Amid Era of Remote Work and High Customer Expectation
Berryville Institute of Machine Learning (BIML) Gets $150,000 Open Philanthropy Grant
Products and Releases  |  1/28/2021  | 
Funding will advance ethical AI research
Dasera Releases Data Lifecycle Trust and Privacy Report on Data Privacy Day
Products and Releases  |  1/28/2021  | 
Findings reveal consumers have less trust in businesses who use or protect their data compared to 5 years ago.
Offensive Security Launches New Course and Certification for Exploit Development and Reverse Engineering
Products and Releases  |  1/27/2021  | 
New Windows User Mode Exploit Development (EXP-301) Training Course Teaches Exploit Development and Reverse Engineering Techniques
Cybercriminals Cash Out as Finance Industry Becomes Lucrative Targets
Products and Releases  |  1/27/2021  | 
Report finds 70% of financial services organizations have reported experiencing a cyberattack in the past 12 months alone.
Ivanti to Acquire Cherwell to Enable End‑to‑End Service and Asset Management
Products and Releases  |  1/27/2021  | 
Ivanti is acquiring Cherwell to expand the reach of its Neurons platform.
TetherView Launches Digital BunkerTM, a Comprehensive One-Way-In and One-Way-Out Private Cloud for Enterprise Customers
Products and Releases  |  1/26/2021  | 
Available starting today as a hosted service or solution, Digital Bunker is a complete IT infrastructure solution, enabling businesses to provide their employees with a trusted, secure virtual environment while managing inbound and outbound data access, security, compliance, disaster recovery, mobility, and more.
Former Google and Microsoft Executive Joins CloudSphere as CEO to Accelerate Company Growth
Products and Releases  |  1/26/2021  | 
Jane Gilson to lead cloud management and governance company as business scales internationally.
Owl Cyber Defense Announces Industry's First Embedded Hardware-Enforced Cybersecurity Modules
Products and Releases  |  1/26/2021  | 
Launches Pioneering Technology to Enable Rapid OEM Device Security Enhancement
CISA Launches Campaign to Reduce the Risk of Ransomware
Products and Releases  |  1/22/2021  | 
Valtix Secures $12.5M in Strategic Investments
Products and Releases  |  1/21/2021  | 
Company also names CEO, VP of worldwide sales, and VP of worldwide operations.
NextGen Cyber Talent Announces its First Pilot Cohort and Governing Board
Products and Releases  |  1/21/2021  | 
Non-profit educator launches operations and seeks to close the cyber talent and diversity gap by training traditionally underprivileged and underserved segments
Varonis Announces New Features to Combat Insider Threats and Collaboration Risks in Microsoft 365
Products and Releases  |  1/19/2021  | 
New enhancements help pinpoint and reduce organizationwide exposure of sensitive data in the cloud
Swimlane Raises $40M Growth Round to Deliver Hyper Automated Security Operations
Products and Releases  |  1/19/2021  | 
On the heels of record sales and customer growth year over year, Swimlane appoints James Brear as Chief Executive Officer and Niloofar Howe as company's newest board member.
Cybersecurity and Networking Staffing Company CIBR Warriors Launches Nationwide
Products and Releases  |  1/15/2021  | 
Firm aims to connect qualified candidates with essential positions to help fill 3.5 million cybersecurity jobs expected to go unfilled in 2021
Cyberbit Kicks Off America's Cyber Cup to Find World's Best Cyber Defense Team
Products and Releases  |  1/14/2021  | 
Premier competition will put professionals through hyper-realistic attack simulations.
Vdoo Reveals an Extension Funding Round with Qumra Capital and Verizon Ventures Joining as Investors
Products and Releases  |  1/13/2021  | 
Connectivity surge in telcos and utilities drives explosive demand for Vdoo's Product Security Platform.
Cyber Risk Ratings Leader NormShield Rebrands to 'Black Kite'
Products and Releases  |  1/13/2021  | 
Relocates headquarters to Boston with plans to double size again in 2021.
Francisco Partners Completes Acquisition of Forcepoint
Products and Releases  |  1/12/2021  | 
Telos Announces Latest Version of its Next-Generation Cyber Risk Management Platform
Products and Releases  |  1/7/2021  | 
Xacta.io 1.5 expands support for scanning and compliance of AWS cloud resources.
Cybersecurity Firm Nisos Announces New Funding and CEO
Products and Releases  |  1/7/2021  | 
$6 million in funding led by Paladin Capital Group.
Quantum Xchange Completes Initial Series A Funding, Appoints New Business and Technology Leaders to Meet Global Demand
Products and Releases  |  1/7/2021  | 
Company Names Eddy Zervigon to CEO, Holly Neiweem as CFO, and Shahryar Shaghaghi to CTO; Phio TX inventor Gene Savchuk moves to role of chief product evangelist and strategic advisor.
Cerberus Sentinel Announces Acquisition of Alpine Security
Products and Releases  |  1/4/2021  | 
US cybersecurity services firm expands compliance and penetration testing teams

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-25
An information disclosure vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to arbitrary file read. An attacker can send a sequence of requests to trigger this vulnera...
PUBLISHED: 2022-05-25
A cleartext transmission of sensitive information vulnerability exists in the OAS Engine configuration communications functionality of Open Automation Software OAS Platform V16.00.0112. A targeted network sniffing attack can lead to a disclosure of sensitive information. An attacker can sniff networ...
PUBLISHED: 2022-05-25
A file write vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.
PUBLISHED: 2022-05-25
An external config control vulnerability exists in the OAS Engine SecureAddUser functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to the creation of an OAS user account. An attacker can send a sequence of requests to trigger t...
PUBLISHED: 2022-05-25
An improper authentication vulnerability exists in the REST API functionality of Open Automation Software OAS Platform V16.00.0121. A specially-crafted series of HTTP requests can lead to unauthenticated use of the REST API. An attacker can send a series of HTTP requests to trigger this vulnerabilit...