Products and Releases

Content posted in November 2016
FireEye Announces Helix the First Intelligence-led Platform to Simplify, Integrate, and Automate Security Operations
Products and Releases  |  11/29/2016  | 
Accelerates response with automation and orchestration powered by machine-learning and behavioral analysis based detection from FireEye MVX plus FireEye iSIGHT Intelligence Delivered via public or private cloud, or on premise, to integrate and prioritize every alert in customer environments within a simple user interface
BeyondTrust Adds File Integrity Monitoring for Unix and Linux Systems
Products and Releases  |  11/29/2016  | 
Least-privilege solution improves security by tamper-proofing critical binaries.
CloudPassage Launches New Release of Halo Agile Security Platform
Products and Releases  |  11/29/2016  | 
Improved Visibility and Filtering for Simplified Workload Security Management
TruSTAR Technology Secures Funding to Accelerate Company Growth and Connective Defense Vision
Products and Releases  |  11/17/2016  | 
Security Startup Obtains New Funding as Companies and Policymakers Signal Growing Need for Privacy-Preserving Cyber Incident Collaboration
Samsung SDS Selects Cyberbit For Industrial Control Security
Products and Releases  |  11/16/2016  | 
Samsung SDS will deliver Cyberbit's SCADAShield to protect its customers' industrial control networks.
Thomson Reuters, Pillsbury, FireEye Align For Cybersecurity Compliance Program
Products and Releases  |  11/14/2016  | 
Thomson Reuters, Pillsbury and FireEye have teamed up to help businesses meet new regulations and manage cybersecurity-related risk.
Thycotic Acquires Cyber Algorithms
Products and Releases  |  11/8/2016  | 
Thycotic has acquired the network security analytics company to identify malicious privileged behavior across systems and users.
FireEye Introduces Cloud MVX and MVX Smart Grid
Products and Releases  |  11/4/2016  | 
The most intelligent threat detection delivered via public, hybrid, or private cloud.
New Report Finds Majority of Activity on the Dark Web is Totally Legal and Mundane
Products and Releases  |  11/4/2016  | 
Terbium Labs Dispels Common Myths and Misconceptions with First Data-Driven Examination of the Dark Web
LightCyber Increases Precision of Behavioral Attack Detection
Products and Releases  |  11/4/2016  | 
New Release Uncovers Malicious Insider or Targeted Attacker Faster and with even Higher Accuracy
NetEnrich Survey: Companies Brace for New Cyber Attacks as Threats Multiply
Products and Releases  |  11/4/2016  | 
Stolen or weak passwords cause most attacks, but companies are also battling rogue employees, state-sponsored organizations, system failures and Advanced Persistent Threats
CounterTack Announces $10M Round of Funding
Products and Releases  |  11/4/2016  | 
Financing Round Closed to Accelerate Global Expansion in APAC and Federal Business.
Flexera Software Acquisition Tackles Open Source Software Security Risks
Products and Releases  |  11/4/2016  | 
Extends license compliance and security capabilities into the under-managed world of open source software components.
FireMon acquires FortyCloud for Multi-cloud Management Capabilities
Products and Releases  |  11/4/2016  | 
Innovation streak continues with new Intelligent Security Management solutions for the cloud.
Intel Security Outlines Strategy for Protecting New Digital Economy
Products and Releases  |  11/3/2016  | 
Intel Security Enhances Unified Defense Architecture to Safeguard Against Threats to Trust, Time and Money
Ubuntu Core 16 delivers foundation for secure IoT
Products and Releases  |  11/3/2016  | 
BioCatch Launches Next-Generation Behavioral Biometrics Platform for Enterprises
Products and Releases  |  11/3/2016  | 
BioCatchs 2.0 Release Delivers State-of-the-Art Fraud Prevention with Enhanced Accuracy, Faster Processing, and New Analytics Tools
DomainTools Launches New Cyber Threat Solution, PhishEye, to Stop Phishing Attacks Before They Occur
Products and Releases  |  11/3/2016  | 
New Cybersecurity Technology Leverages World's Largest DNS Database to Help Organizations Take Preventative Action Against Threats and Monitor "Phishy" Domain Names
Acalvio Technologies Secures Investment from GV
Products and Releases  |  11/3/2016  | 
GV (formerly Google Ventures) Joins Accel Ventures, Ignition Partners, Eileses Capital and Splunk, Bringing Total Investment in the Company to $22M
NSS Labs Tests Leading Web Browsers for Secure End User Experience
Products and Releases  |  11/1/2016  | 
Ransomware, socially engineered malware, and phishing increasingly used by attackers


Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
Election Websites, Backend Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10510
PUBLISHED: 2018-08-15
A Directory Traversal Remote Code Execution vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to execute arbitrary code on vulnerable installations.
CVE-2018-10511
PUBLISHED: 2018-08-15
A vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to conduct a server-side request forgery (SSRF) attack on vulnerable installations.
CVE-2018-10512
PUBLISHED: 2018-08-15
A vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to manipulate a reverse proxy .dll on vulnerable installations, which may lead to a denial of server (DoS).
CVE-2018-8753
PUBLISHED: 2018-08-15
The IKEv1 implementation in Clavister cOS Core before 11.00.11, 11.20.xx before 11.20.06, and 12.00.xx before 12.00.09 allows remote attackers to decrypt RSA-encrypted nonces by leveraging a Bleichenbacher attack.
CVE-2018-9129
PUBLISHED: 2018-08-15
ZyXEL ZyWALL/USG series devices have a Bleichenbacher vulnerability in their Internet Key Exchange (IKE) handshake implementation used for IPsec based VPN connections.