Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in October 2017
80% of Businesses Plan to Change Their IT Security Management in the Next 12 Months
Products and Releases  |  10/31/2017  | 
New report from SolarWinds also finds half of businesses plan to outsource security within the year.
RiskIQ Announces GDPR PII Analytics Solution for Website Compliance
Products and Releases  |  10/31/2017  | 
New functionality aims to help organizations ensure that their websites comply with the new EU General Data Protection Regulation (GDPR).
Recorded Future Raises $25M to Drive Threat Intelligence
Products and Releases  |  10/31/2017  | 
New investment will enable the company to rapidly grow its threat intelligence capabilities for customers and expand into new geographies.
Check Point Partners With LG To Secure Smart Home Devices
Products and Releases  |  10/30/2017  | 
Check Point helps block a major security vulnerability in LG SmartThinQ® home IoT appliances.
Romanian Men Convicted for Role in ATM Skimming Crew
Products and Releases  |  10/30/2017  | 
Proficio Unveils 'First Year Free' Services Program
Products and Releases  |  10/30/2017  | 
One year of cybersecurity services through Proficio’s global security operations centers will be available to 30 select organizations
Duo Security Raises $70 Million, Earning Valuation of More than $1 Billion
Products and Releases  |  10/26/2017  | 
Duo will use round of funding led by Meritech Capital Partners and Lead Edge Capital to expand global operations and fund increased innovation in the trusted access space
Attivo Networks Announces Adaptive Deception Campaigns
Products and Releases  |  10/25/2017  | 
Self-learning Campaigns Designed for Evolving Threat Landscape, Attack Surface.
Cygilant Launches New Vulnerability and Patch Management Subscription Service
Products and Releases  |  10/25/2017  | 
Cygilant’s Industry-first ‘One Vendor’ Approach to Vulnerability and Patch Management Aims to Streamline Workflows; Speeding Cyber Threat Response Times and Lowering Cost of Ownership
Samsung SDS America Adds BioCatch Behavioral Biometrics to Nexsign™ Platform to Enable Secure, Frictionless Mobile Experiences
Products and Releases  |  10/24/2017  | 
Groundbreaking Fintech Partnership Addresses Market Demand For Continuous, Strong Identity Assurance Within Mobile Banking and Payment Applications
KnowBe4 Closes $30 Million Series B Investment
Products and Releases  |  10/24/2017  | 
Funding will fuel KnowBe4’s rapid international growth and continued efforts in security awareness and simulated phishing attack market.
Industrial Internet Consortium Publishes Industrial IoT Analytics Framework Technical Report
Products and Releases  |  10/24/2017  | 
Report aims to be blueprint that maps analytics to IIoT applications.
Mocana Joins Silicon Vendors to Protect the Internet of Things
Products and Releases  |  10/23/2017  | 
Industrial IoT Security Leader to Support Platform Security Architecture from Arm.
Booz Allen to Acquire Morphick for Cyber Defense
Products and Releases  |  10/23/2017  | 
Study: 61 Percent of Organizations Have Minimal Control of SSH Privileged Access
Products and Releases  |  10/20/2017  | 
Only 35 percent rotate SSH keys as an automated process when administrators leave or are reassigned
Dataguise Delivers Support for GDPR Right of Access and Erasure Requirements
Products and Releases  |  10/19/2017  | 
New Capabilities in DgSecure data-centric audit and protection (DCAP) visibility of sensitive data to address requirements.
NSS Labs Announces 2017 Breach Detection Systems Group Test Results
Products and Releases  |  10/19/2017  | 
Four Products Receive Recommended Rating, other products receive a neutral rating, security recommended rating, and caution rating.
Cornell launches Milstein Program in Technology and Humanity
Products and Releases  |  10/19/2017  | 
Pioneering a new approach to Liberal Arts education for the digital age.
Corero Network Security Expands Product Family to Include Real-Time Virtualized DDoS Protection
Products and Releases  |  10/18/2017  | 
Enables greater flexibility for deploying automated DDoS mitigation at the scale, speed and efficacy Corero is best known for
Arbor Networks Introduces DDoS Protection for Small and Medium Enterprise
Products and Releases  |  10/17/2017  | 
Advanced DDoS protection aims to provide service to customers without their having to sacrifice.
Illusive Networks’ New Mainframe Deception Addresses Financial Services Security
Products and Releases  |  10/16/2017  | 
Launching at Sibos: Mainframe Guard – a non-intrusive solution to protect the powerhouse that keeps the world’s systems running.
Fake Insurance Tax Form Scam Aims at Stealing Data from Tax Pros, Clients
Products and Releases  |  10/12/2017  | 
Fake insurance tax form scam is making the rounds.
Former Employee of Transcontinental Railroad Company Found Guilty of Damaging Ex-Employer’s Computer Network
Products and Releases  |  10/10/2017  | 
Canadian Pacific Railway former employee convicted for causing intentional damage to Canadian Pacific’s computer network.
BSIMM8 Study Reinforces Benchmarking in Early Stages of Software Security Initiatives
Products and Releases  |  10/9/2017  | 
First Time Released in APAC, the Latest Iteration of the Building Security in Maturity Model Shows More Organizations Jumpstarting their Software Security Initiatives with Assessments and Improving Over Time
Cymulate Adds Two New Products to Cybersecurity Lineup
Products and Releases  |  10/6/2017  | 
New McAfee Report Highlights Global Impact of Changing Data Protection Landscape
Products and Releases  |  10/5/2017  | 
Seventy Percent of Business Decision-Makers Say GDPR will Make the European Union the World Leader in Data Protection.
Dover Microsystems Launches CoreGuard
Products and Releases  |  10/5/2017  | 
Applies hardware-based cybersecurity approach to protecting IoT and embedded computing devices against cyber attacks.
Gemalto and Ledger Join Forces to Provide Security Infrastructure for Cryptocurrency Based Activities
Products and Releases  |  10/4/2017  | 
Robust encryption and transaction security for Financial Institutions
Finance Industry Faces Major Security Risks from Outdated Vendor Systems
Products and Releases  |  10/4/2017  | 
Analysis finds critical vendors lack same security standards that finance organizations hold for themselves, leaving finance industry at risk.
ISA to Lead Joint DHS - IT Sector Cybersecurity Policy Initiative
Products and Releases  |  10/3/2017  | 
ISA president Larry Clinton to lead the joint cybersecurity policy effort.
Cyber Criminals Focused on Credential Theft: Report
Products and Releases  |  10/2/2017  | 
Cryptomathic Granted New Patent for Strong Non-Repudiation with eSignatures
Products and Releases  |  10/1/2017  | 
Extends Cryptomathic's eSignature IP to bolster its remote eSignatures business.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file