Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2010
<<   <   Page 2 / 2
Dataguise Offers Free One-Day Risk Assessment Service To Identify Unprotected Sensitive Data Across Databases
Products and Releases  |  12/9/2010  | 
R.A.P.I.D. Service uses Dataguise DgDiscoverT, an automated database security solution
Agiliance Puts Cloud Security Alliance GRC Stack In RiskVision
Products and Releases  |  12/9/2010  | 
Customers can monitor compliance in the cloud against specific frameworks and regulations
Zenprise Rolls Out New Mobile Security Technology
Products and Releases  |  12/9/2010  | 
MobileManager version 6.0 dynamically protects applications and data anywhere in the mobile environment
Nominum Announces Dashboard To Analyze Network Data
Products and Releases  |  12/8/2010  | 
iView is a hosted service with a browser-based graphical interface
Fidelis Adds Botnet Visibility And Control To Enterprise Security Software
Products and Releases  |  12/8/2010  | 
Fidelis XPS provides an Anti-Botnet threat intelligence feed powered by Umbra Data
House Passes Bill To Provide Important Fix For Security Industry
Products and Releases  |  12/8/2010  | 
Proposal advocated by SIA-led coalition would undo nonsensical energy requirement
Core Security Rolls Out Core Impact Pro Version 11
Products and Releases  |  12/8/2010  | 
With IMPACT Pro v11 penetration testing software, organizations can now assess their exposure to attacks carried out against network devices
GFI Software Discovers Amazon Receipt Generator Scam
Products and Releases  |  12/8/2010  | 
Web program creates fake receipts, targeting retailers during the height of holiday shopping season
ComplyGuard Networks Introduces ComplyShield 4.0T
Products and Releases  |  12/8/2010  | 
ComplyShield 4.0 provides a new interface and a new vulnerability dashboard
Secunia Debuts Security Factsheets
Products and Releases  |  12/7/2010  | 
Factsheets outline the development in advisories and vulnerabilities for a specific application, system, or plug-in
eEye Rolls Out Centralized End-To-End Vulnerability, Compliance Product
Products and Releases  |  12/7/2010  | 
Retina CS 2.0 Management Console provides centralized vulnerability management across enterprises of any size
Anonymous Cyber-Activist Group Launches New Attacks In Defense Of WikiLeaks Founder
Products and Releases  |  12/7/2010  | 
So far PandaLabs has detected three attacks
Symantec: Cybercriminals Diversified Attack Tactics To Sustain High Levels Of Spam, Malware In 2010
Products and Releases  |  12/7/2010  | 
Botnets prove resilient another year on; email-borne malware increases 100-fold
MasterCard Worldwide Launches Next Generation Fraud Prevention Solutions
Products and Releases  |  12/7/2010  | 
Services represent the latest addition to MasterCard's suite of Expert Monitoring Solutions
Entrust's Fraud Detection, Strong Authentication Platforms Double In Sales This Year
Products and Releases  |  12/6/2010  | 
Credentialing, mobility, fraud detection, and authentication solutions underpin momentum
Ground Labs, Stickman Consulting Partner To Enable PCI Compliance Throughout Asia Pacific
Products and Releases  |  12/6/2010  | 
Stickman Consulting will leverage partnership to offer Ground Labs' PCI compliance products
AmIHackerProof.com 2.0 Takes Vulnerability Scan Testing To Another Level
Products and Releases  |  12/6/2010  | 
Online security audit service detects vulnerabilities on a person's computer or network
Emerging Threats, NitroSecurity Form Technology Partnership To Share Threat Intelligence
Products and Releases  |  12/6/2010  | 
Companies will share research and combine rulesets
Imperva Unveils Comprehensive Strategy To Enhance Data Security In The Cloud
Products and Releases  |  12/6/2010  | 
Additionally, Imperva spin-off Incapsula will help Web hosters give SMBs affordable Web application protection
ESG Study: 2/3 Of Critical Infrastructure Orgs Suffer Cyber Breaches
Products and Releases  |  12/3/2010  | 
Research focused specifically on cyber supply-chain policies, processes, and technical safeguards
AMTSO Publishes Guidelines For False Positive Testing
Products and Releases  |  12/3/2010  | 
Anti-Malware Testing Standards Organization make guidelines available for free download
Barracuda Launches SaaS Email Service
Products and Releases  |  12/2/2010  | 
Barracuda Email Security Service can be leveraged as a cloud protection layer for the Barracuda Spam & Virus Firewall
New Hacker Campaign Targets Holiday Trending Topics On Twitter To Spread Malware, According To PandaLabs
Products and Releases  |  12/2/2010  | 
Hackers are capitalizing on holiday-themed words and phrases to direct users to malicious websites
Novell Reports Financial Results For Fourth Fiscal Quarter And Full Fiscal Year 2010
Products and Releases  |  12/2/2010  | 
Novell reported Q4 net revenue of $207 million
Palo Alto Networks CEO Resigns, Search Begins For Replacement
Products and Releases  |  12/2/2010  | 
Differences in leadership philosophy leads to Lane Bess' resignation
eIQnetworks Unveils Real-Time Forensic Search Engine For Security and Compliance Data
Products and Releases  |  12/1/2010  | 
ForensicVue extends the existing forensic capabilities of eIQnetworks' unified situational awareness platform
Eyeball Releases Firewall And NAT Traversal Solution For iPhone
Products and Releases  |  12/1/2010  | 
AnyFirewall Engine designed for the iOS operating system
PacketMotion Delivers Tool For New Zero Trust Model Of Information Security
Products and Releases  |  12/1/2010  | 
PacketSentry is designed for protection and audit of the internal network
DOJ: Former University Students Indicted For Hacking At Their School
Products and Releases  |  12/1/2010  | 
Pair gained unlawful and unauthorized access to the University of Central Missouri computer network
AlphaSSL To Launch Enhanced SSL Features And Reduced Pricing
Products and Releases  |  12/1/2010  | 
Enhanced certificate offering includes moving to an unlimited server licensing model
CA Identity Manager Now Available on Salesforce.com AppExchange 2, Marketplace For Business Apps
Products and Releases  |  12/1/2010  | 
CA Identity Manager on AppExchange 2 automates identity management functions
WatchGuard Upgrades Messaging Security Appliance
Products and Releases  |  12/1/2010  | 
WatchGuard XCS 770R aimed at midmarket and enterprise environments
IBM And American Well Team To Enhance Security For Online Health Data
Products and Releases  |  12/1/2010  | 
Partnership to further embed security into American Well's Online Care system
Softonic.com Offers Secure Free Software Download Site
Products and Releases  |  12/1/2010  | 
Launches new security seal that scans programs before they are downloaded to ensure they are not infected with a virus
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type=&quot;text&quot;` via a javascript &quot;Show Password&quot; button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn&acirc;&euro;&trade;t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file