Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2015
Dispel Emerges from Stealth, Introduces New Model for Digital Privacy Protection
Products and Releases  |  12/29/2015  | 
The worlds first one-click Privacy-as-a-Service platform that enables you to reclaim your privacy online with comprehensive content, identity, and location protection across mobile phones, computers and cloud services
Center for Internet Securitys Critical Security Controls V. 6.0 Downloads Top 12,560
Products and Releases  |  12/22/2015  | 
Three New Companion Guides to the CIS Controls Released
Rapid7 Automates API Security Testing to Reduce Risk in Web Applications
Products and Releases  |  12/18/2015  | 
AppSpider Now Compatible with Swagger Framework for Fully Automated API Testing
Nexusguard Introduces Software-Defined Networking to DDoS with Nexusguard AI
Products and Releases  |  12/18/2015  | 
Nexusguard AI Brings Automated Route Engineering, Real-Time Scrubbing Center Health, Capacity
Digital Guardian Secures $66 Million from Leading Financial Investment Firms as Worldwide Demand for Data Protection Accelerates
Products and Releases  |  12/18/2015  | 
Additional Funds will Fuel Product Innovation, Global Expansion and New Technology Partnerships for Digital Guardians Next Generation Data Protection Platform
Lack of Talent, Skills and Recruiting Among Challenges Facing Cyber Security Profession, Cybrary Survey Shows
Products and Releases  |  12/18/2015  | 
Over two-thirds of senior technology professionals recognize global shortage of skilled cyber security workers
Global survey by Gemalto reveals impact of data breaches on customer loyalty
Products and Releases  |  12/10/2015  | 
Global survey by Gemalto reveals impact of data breaches on customer loyalty. SHARE THIS Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.
Research: Global Privacy Rights Movement Poses New Business, Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years.
Viewer Beware: Internet Users 28 Times More Likely to Get Malware From Content Theft Sites, RiskIQ Study Uncovers
Products and Releases  |  12/10/2015  | 
Drive-by Downloads: Nearly Half of Malware Is Delivered To Users' Computers From Content Theft Sites Without Even Requiring Click on a Link
Intralinks Research: A Global Privacy Rights Movement Poses New Business and Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years
NEW YORK AND NEW JERSEY LAWMAKERS ANNOUNCE NEW CYBER PROTECTION TEAM
Products and Releases  |  12/9/2015  | 
After Lawmakers Year Long Push - National Guard Chooses Latham Armory as the Mission Command Site - Establishes New York and New Jersey As Leader In Counter-Terrorism & Cyber-Terrorism Research
SANS to Debut CISO Hot Topic Series at Scottsdale 2016 Cybersecurity Training Event
Products and Releases  |  12/9/2015  | 
Will Share How to Effectively Communicate to and Influence CEOs and Boards of Directors.
BrightPoint Security joins IBM Security App Exchange community
Products and Releases  |  12/8/2015  | 
entinel View Security Command Platform Part of Collaborative Development to Stay Ahead of Evolving Threats
ONLINE PRIVACY GETS A FACELIFT
Products and Releases  |  12/3/2015  | 
Own your social network and easy password management newest additions to privacy lineup from SpiderOak
CloudFlare Introduces HTTP/2 Support, Bringing All Customers Into the Modern Internet for Free
Products and Releases  |  12/3/2015  | 
The Size of the HTTP/2 Universe Doubles Today
Venafi Co-Authors New NIST Report on Managing & Securing SSH Keys
Products and Releases  |  12/3/2015  | 
Published Guidance Offers Enterprises Advice on How to Identify and Protect Against Root-Level Compromises
Symantec Expands Global Security Operations Centers With US$50 Million Investment
Products and Releases  |  12/2/2015  | 
Larger Asia-Pacific Presence Gives Customers More Comprehensive Monitoring and Intelligence to Stop Advanced Attacks
Advancements in Threat Intel Evolve to Deliver Early Warning of Cyber Attacks
Products and Releases  |  12/2/2015  | 
BrightPoint Security Delivers Industrys First Security Command Platform with Dynamic Insight to Predict Current Threats and Threat Changes Across Digital Ecosystems
ThreatQuotient Announces $10.2M in Series A Funding
Products and Releases  |  12/2/2015  | 
Investment strengthens ThreatQuotients ability to transform threat intelligence through innovative platform developed with analyst workflows and processes at its core.
Capgemini launches new identity as a service cybersecurity offering
Products and Releases  |  12/1/2015  | 
New offering leverages Capgeminis cloud automation services to provide organizations with more flexible, comprehensive and cost-effective identity and access management as a service
Thycotic Teams Up with Adobe to Bring Enhanced Privileged Account Security to Build Environments for Cloud Applications
Products and Releases  |  12/1/2015  | 
Global Leader in Digital Media and Digital Marketing Solutions Leverages Thycotic Secret Server in Bleeding Edge Security Automation Practices


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30333
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CVE-2022-23066
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
CVE-2022-28463
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
CVE-2022-28470
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
CVE-2022-1620
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.