Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2015
Dispel Emerges from Stealth, Introduces New Model for Digital Privacy Protection
Products and Releases  |  12/29/2015  | 
The worlds first one-click Privacy-as-a-Service platform that enables you to reclaim your privacy online with comprehensive content, identity, and location protection across mobile phones, computers and cloud services
Center for Internet Securitys Critical Security Controls V. 6.0 Downloads Top 12,560
Products and Releases  |  12/22/2015  | 
Three New Companion Guides to the CIS Controls Released
Rapid7 Automates API Security Testing to Reduce Risk in Web Applications
Products and Releases  |  12/18/2015  | 
AppSpider Now Compatible with Swagger Framework for Fully Automated API Testing
Nexusguard Introduces Software-Defined Networking to DDoS with Nexusguard AI
Products and Releases  |  12/18/2015  | 
Nexusguard AI Brings Automated Route Engineering, Real-Time Scrubbing Center Health, Capacity
Digital Guardian Secures $66 Million from Leading Financial Investment Firms as Worldwide Demand for Data Protection Accelerates
Products and Releases  |  12/18/2015  | 
Additional Funds will Fuel Product Innovation, Global Expansion and New Technology Partnerships for Digital Guardians Next Generation Data Protection Platform
Lack of Talent, Skills and Recruiting Among Challenges Facing Cyber Security Profession, Cybrary Survey Shows
Products and Releases  |  12/18/2015  | 
Over two-thirds of senior technology professionals recognize global shortage of skilled cyber security workers
Global survey by Gemalto reveals impact of data breaches on customer loyalty
Products and Releases  |  12/10/2015  | 
Global survey by Gemalto reveals impact of data breaches on customer loyalty. SHARE THIS Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.
Research: Global Privacy Rights Movement Poses New Business, Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years.
Viewer Beware: Internet Users 28 Times More Likely to Get Malware From Content Theft Sites, RiskIQ Study Uncovers
Products and Releases  |  12/10/2015  | 
Drive-by Downloads: Nearly Half of Malware Is Delivered To Users' Computers From Content Theft Sites Without Even Requiring Click on a Link
Intralinks Research: A Global Privacy Rights Movement Poses New Business and Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years
NEW YORK AND NEW JERSEY LAWMAKERS ANNOUNCE NEW CYBER PROTECTION TEAM
Products and Releases  |  12/9/2015  | 
After Lawmakers Year Long Push - National Guard Chooses Latham Armory as the Mission Command Site - Establishes New York and New Jersey As Leader In Counter-Terrorism & Cyber-Terrorism Research
SANS to Debut CISO Hot Topic Series at Scottsdale 2016 Cybersecurity Training Event
Products and Releases  |  12/9/2015  | 
Will Share How to Effectively Communicate to and Influence CEOs and Boards of Directors.
BrightPoint Security joins IBM Security App Exchange community
Products and Releases  |  12/8/2015  | 
entinel View Security Command Platform Part of Collaborative Development to Stay Ahead of Evolving Threats
ONLINE PRIVACY GETS A FACELIFT
Products and Releases  |  12/3/2015  | 
Own your social network and easy password management newest additions to privacy lineup from SpiderOak
CloudFlare Introduces HTTP/2 Support, Bringing All Customers Into the Modern Internet for Free
Products and Releases  |  12/3/2015  | 
The Size of the HTTP/2 Universe Doubles Today
Venafi Co-Authors New NIST Report on Managing & Securing SSH Keys
Products and Releases  |  12/3/2015  | 
Published Guidance Offers Enterprises Advice on How to Identify and Protect Against Root-Level Compromises
Symantec Expands Global Security Operations Centers With US$50 Million Investment
Products and Releases  |  12/2/2015  | 
Larger Asia-Pacific Presence Gives Customers More Comprehensive Monitoring and Intelligence to Stop Advanced Attacks
Advancements in Threat Intel Evolve to Deliver Early Warning of Cyber Attacks
Products and Releases  |  12/2/2015  | 
BrightPoint Security Delivers Industrys First Security Command Platform with Dynamic Insight to Predict Current Threats and Threat Changes Across Digital Ecosystems
ThreatQuotient Announces $10.2M in Series A Funding
Products and Releases  |  12/2/2015  | 
Investment strengthens ThreatQuotients ability to transform threat intelligence through innovative platform developed with analyst workflows and processes at its core.
Capgemini launches new identity as a service cybersecurity offering
Products and Releases  |  12/1/2015  | 
New offering leverages Capgeminis cloud automation services to provide organizations with more flexible, comprehensive and cost-effective identity and access management as a service
Thycotic Teams Up with Adobe to Bring Enhanced Privileged Account Security to Build Environments for Cloud Applications
Products and Releases  |  12/1/2015  | 
Global Leader in Digital Media and Digital Marketing Solutions Leverages Thycotic Secret Server in Bleeding Edge Security Automation Practices


Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...