Products and Releases

Content posted in November 2016
FireEye Announces Helix the First Intelligence-led Platform to Simplify, Integrate, and Automate Security Operations
Products and Releases  |  11/29/2016  | 
Accelerates response with automation and orchestration powered by machine-learning and behavioral analysis based detection from FireEye MVX plus FireEye iSIGHT Intelligence Delivered via public or private cloud, or on premise, to integrate and prioritize every alert in customer environments within a simple user interface
BeyondTrust Adds File Integrity Monitoring for Unix and Linux Systems
Products and Releases  |  11/29/2016  | 
Least-privilege solution improves security by tamper-proofing critical binaries.
CloudPassage Launches New Release of Halo Agile Security Platform
Products and Releases  |  11/29/2016  | 
Improved Visibility and Filtering for Simplified Workload Security Management
TruSTAR Technology Secures Funding to Accelerate Company Growth and Connective Defense Vision
Products and Releases  |  11/17/2016  | 
Security Startup Obtains New Funding as Companies and Policymakers Signal Growing Need for Privacy-Preserving Cyber Incident Collaboration
Samsung SDS Selects Cyberbit For Industrial Control Security
Products and Releases  |  11/16/2016  | 
Samsung SDS will deliver Cyberbit's SCADAShield to protect its customers' industrial control networks.
Thomson Reuters, Pillsbury, FireEye Align For Cybersecurity Compliance Program
Products and Releases  |  11/14/2016  | 
Thomson Reuters, Pillsbury and FireEye have teamed up to help businesses meet new regulations and manage cybersecurity-related risk.
Thycotic Acquires Cyber Algorithms
Products and Releases  |  11/8/2016  | 
Thycotic has acquired the network security analytics company to identify malicious privileged behavior across systems and users.
FireEye Introduces Cloud MVX and MVX Smart Grid
Products and Releases  |  11/4/2016  | 
The most intelligent threat detection delivered via public, hybrid, or private cloud.
New Report Finds Majority of Activity on the Dark Web is Totally Legal and Mundane
Products and Releases  |  11/4/2016  | 
Terbium Labs Dispels Common Myths and Misconceptions with First Data-Driven Examination of the Dark Web
LightCyber Increases Precision of Behavioral Attack Detection
Products and Releases  |  11/4/2016  | 
New Release Uncovers Malicious Insider or Targeted Attacker Faster and with even Higher Accuracy
NetEnrich Survey: Companies Brace for New Cyber Attacks as Threats Multiply
Products and Releases  |  11/4/2016  | 
Stolen or weak passwords cause most attacks, but companies are also battling rogue employees, state-sponsored organizations, system failures and Advanced Persistent Threats
CounterTack Announces $10M Round of Funding
Products and Releases  |  11/4/2016  | 
Financing Round Closed to Accelerate Global Expansion in APAC and Federal Business.
Flexera Software Acquisition Tackles Open Source Software Security Risks
Products and Releases  |  11/4/2016  | 
Extends license compliance and security capabilities into the under-managed world of open source software components.
FireMon acquires FortyCloud for Multi-cloud Management Capabilities
Products and Releases  |  11/4/2016  | 
Innovation streak continues with new Intelligent Security Management solutions for the cloud.
Intel Security Outlines Strategy for Protecting New Digital Economy
Products and Releases  |  11/3/2016  | 
Intel Security Enhances Unified Defense Architecture to Safeguard Against Threats to Trust, Time and Money
Ubuntu Core 16 delivers foundation for secure IoT
Products and Releases  |  11/3/2016  | 
BioCatch Launches Next-Generation Behavioral Biometrics Platform for Enterprises
Products and Releases  |  11/3/2016  | 
BioCatchs 2.0 Release Delivers State-of-the-Art Fraud Prevention with Enhanced Accuracy, Faster Processing, and New Analytics Tools
DomainTools Launches New Cyber Threat Solution, PhishEye, to Stop Phishing Attacks Before They Occur
Products and Releases  |  11/3/2016  | 
New Cybersecurity Technology Leverages World's Largest DNS Database to Help Organizations Take Preventative Action Against Threats and Monitor "Phishy" Domain Names
Acalvio Technologies Secures Investment from GV
Products and Releases  |  11/3/2016  | 
GV (formerly Google Ventures) Joins Accel Ventures, Ignition Partners, Eileses Capital and Splunk, Bringing Total Investment in the Company to $22M
NSS Labs Tests Leading Web Browsers for Secure End User Experience
Products and Releases  |  11/1/2016  | 
Ransomware, socially engineered malware, and phishing increasingly used by attackers


6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.