Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in November 2016
FireEye Announces Helix the First Intelligence-led Platform to Simplify, Integrate, and Automate Security Operations
Products and Releases  |  11/29/2016  | 
Accelerates response with automation and orchestration powered by machine-learning and behavioral analysis based detection from FireEye MVX plus FireEye iSIGHT Intelligence Delivered via public or private cloud, or on premise, to integrate and prioritize every alert in customer environments within a simple user interface
BeyondTrust Adds File Integrity Monitoring for Unix and Linux Systems
Products and Releases  |  11/29/2016  | 
Least-privilege solution improves security by tamper-proofing critical binaries.
CloudPassage Launches New Release of Halo Agile Security Platform
Products and Releases  |  11/29/2016  | 
Improved Visibility and Filtering for Simplified Workload Security Management
TruSTAR Technology Secures Funding to Accelerate Company Growth and Connective Defense Vision
Products and Releases  |  11/17/2016  | 
Security Startup Obtains New Funding as Companies and Policymakers Signal Growing Need for Privacy-Preserving Cyber Incident Collaboration
Samsung SDS Selects Cyberbit For Industrial Control Security
Products and Releases  |  11/16/2016  | 
Samsung SDS will deliver Cyberbit's SCADAShield to protect its customers' industrial control networks.
Thomson Reuters, Pillsbury, FireEye Align For Cybersecurity Compliance Program
Products and Releases  |  11/14/2016  | 
Thomson Reuters, Pillsbury and FireEye have teamed up to help businesses meet new regulations and manage cybersecurity-related risk.
Thycotic Acquires Cyber Algorithms
Products and Releases  |  11/8/2016  | 
Thycotic has acquired the network security analytics company to identify malicious privileged behavior across systems and users.
FireEye Introduces Cloud MVX and MVX Smart Grid
Products and Releases  |  11/4/2016  | 
The most intelligent threat detection delivered via public, hybrid, or private cloud.
New Report Finds Majority of Activity on the Dark Web is Totally Legal and Mundane
Products and Releases  |  11/4/2016  | 
Terbium Labs Dispels Common Myths and Misconceptions with First Data-Driven Examination of the Dark Web
LightCyber Increases Precision of Behavioral Attack Detection
Products and Releases  |  11/4/2016  | 
New Release Uncovers Malicious Insider or Targeted Attacker Faster and with even Higher Accuracy
NetEnrich Survey: Companies Brace for New Cyber Attacks as Threats Multiply
Products and Releases  |  11/4/2016  | 
Stolen or weak passwords cause most attacks, but companies are also battling rogue employees, state-sponsored organizations, system failures and Advanced Persistent Threats
CounterTack Announces $10M Round of Funding
Products and Releases  |  11/4/2016  | 
Financing Round Closed to Accelerate Global Expansion in APAC and Federal Business.
Flexera Software Acquisition Tackles Open Source Software Security Risks
Products and Releases  |  11/4/2016  | 
Extends license compliance and security capabilities into the under-managed world of open source software components.
FireMon acquires FortyCloud for Multi-cloud Management Capabilities
Products and Releases  |  11/4/2016  | 
Innovation streak continues with new Intelligent Security Management solutions for the cloud.
Intel Security Outlines Strategy for Protecting New Digital Economy
Products and Releases  |  11/3/2016  | 
Intel Security Enhances Unified Defense Architecture to Safeguard Against Threats to Trust, Time and Money
Ubuntu Core 16 delivers foundation for secure IoT
Products and Releases  |  11/3/2016  | 
BioCatch Launches Next-Generation Behavioral Biometrics Platform for Enterprises
Products and Releases  |  11/3/2016  | 
BioCatchs 2.0 Release Delivers State-of-the-Art Fraud Prevention with Enhanced Accuracy, Faster Processing, and New Analytics Tools
DomainTools Launches New Cyber Threat Solution, PhishEye, to Stop Phishing Attacks Before They Occur
Products and Releases  |  11/3/2016  | 
New Cybersecurity Technology Leverages World's Largest DNS Database to Help Organizations Take Preventative Action Against Threats and Monitor "Phishy" Domain Names
Acalvio Technologies Secures Investment from GV
Products and Releases  |  11/3/2016  | 
GV (formerly Google Ventures) Joins Accel Ventures, Ignition Partners, Eileses Capital and Splunk, Bringing Total Investment in the Company to $22M
NSS Labs Tests Leading Web Browsers for Secure End User Experience
Products and Releases  |  11/1/2016  | 
Ransomware, socially engineered malware, and phishing increasingly used by attackers


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-26067
PUBLISHED: 2022-05-25
An information disclosure vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to arbitrary file read. An attacker can send a sequence of requests to trigger this vulnera...
CVE-2022-26077
PUBLISHED: 2022-05-25
A cleartext transmission of sensitive information vulnerability exists in the OAS Engine configuration communications functionality of Open Automation Software OAS Platform V16.00.0112. A targeted network sniffing attack can lead to a disclosure of sensitive information. An attacker can sniff networ...
CVE-2022-26082
PUBLISHED: 2022-05-25
A file write vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2022-26303
PUBLISHED: 2022-05-25
An external config control vulnerability exists in the OAS Engine SecureAddUser functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to the creation of an OAS user account. An attacker can send a sequence of requests to trigger t...
CVE-2022-26833
PUBLISHED: 2022-05-25
An improper authentication vulnerability exists in the REST API functionality of Open Automation Software OAS Platform V16.00.0121. A specially-crafted series of HTTP requests can lead to unauthenticated use of the REST API. An attacker can send a series of HTTP requests to trigger this vulnerabilit...