Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2014
Page 1 / 2   >   >>
Mobile Malware Evolution: Three Infection Attempts Per User In 2013
Products and Releases  |  2/28/2014  | 
Nearly 145,000 new malicious programs for mobile devices were detected in 2013
SAS For Windows Buffer Overflow Leads To Code Execution
Products and Releases  |  2/28/2014  | 
Vulnerabilities were discovered in a routine security crash
Qualys Introduces Continuous Monitoring Cloud Service For Global Perimeters
Products and Releases  |  2/28/2014  | 
QualysGuard Cloud Platform available immediately in beta for all customers
TraceSecurity Enhances TraceCSO To Simplify IT GRC Management
Products and Releases  |  2/28/2014  | 
Customers will see improvements in key features, new functionality, and other enhanced performance metrics
Tufin Unveils Tufin Orchestration Suite Version R14-1
Products and Releases  |  2/28/2014  | 
Company also announces integration with IT automation leader Puppet Labs
Catbird Partners With Trapezoid
Products and Releases  |  2/28/2014  | 
Combined solution will leverage Trapezoid Marker to meet 24 FISMA controls
Barracuda Announces Third Quarter Fiscal 2014 Results
Products and Releases  |  2/27/2014  | 
Gross billings up 19% year-over-year to a record $77.5 million
Commtouch Completes Name Change To CYREN
Products and Releases  |  2/27/2014  | 
Company adopted new name as part of transformation into provider of cloud-based information security solutions
Napatech Unveils Network Analysis Adapter To Enhance Appliance Throughput
Products and Releases  |  2/27/2014  | 
Four-port 10 Gbps network analysis adapter provides full 40 Gbps analysis
New Verizon Cyber Intelligence Center Helps Speed Detection, Mitigation Of Cyberthreats For Enterprises, Government Agencies
Products and Releases  |  2/27/2014  | 
VCIC will provide sources of threat intelligence so enterprises can identify and respond to threats early in attack cycle
Lancope Announces New Global Secure Partner Program
Products and Releases  |  2/26/2014  | 
Program is now available in the U.S.
Netskope Survey: More Than 60 Percent Of IT's Most Security Savvy Professionals Are Either Unaware Of Their Company's Cloud App Policies Or Don't Have One
Products and Releases  |  2/26/2014  | 
In absence of cloud app policies, more than two-thirds of attendees surveyed said they would consider their company's privacy policy before downloading an app
Emulex Announces Endace Fusion Connector For Sourcefire Defense Center
Products and Releases  |  2/26/2014  | 
Connector enables streamlined access to granular network packet history
Fortinet 2014 Privacy Survey Reveals Gen-X And Millennial Attitudes Surrounding Passwords, Personal Data, Email Snooping, Online Marketing Practices
Products and Releases  |  2/26/2014  | 
Survey revealed 41% of respondents never change online passwords or only when prompted
Trend Micro Evolves Mobile Security Solutions, Elevating Capabilities for Combating Cyber Threats And Data Loss For Businesses, Consumers
Products and Releases  |  2/26/2014  | 
New solutions will help mitigate threats to mobile networks and devices
Wave Systems Begins Shipping its Management Software With Samsung Electronics' TPM Security Chips
Products and Releases  |  2/26/2014  | 
With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit
Samsung And Zscaler Announce Enterprise-Ready Mobile Security Solution
Products and Releases  |  2/26/2014  | 
Solution extends security and compliance policies from Zscaler security cloud to Samsung KNOX
nPulse Technologies Launches Cyclone Network Forensics Platform For The 10 Gig World
Products and Releases  |  2/26/2014  | 
Cyclone Network Forensics Platform includes line-rate extraction of crucial application layer security metadata
Veracode Launches Software Composition Analysis Service
Products and Releases  |  2/26/2014  | 
Integrates software composition analysis (SCA) with application security analysis in a cloud-based platform
SAFECode Releases Free Online Software Security Training Courses
Products and Releases  |  2/26/2014  | 
Courses range from preventing SQL injection to avoiding cross site request forgery
Huawei Launches Next Generation Anti-DDoS Solution At RSA Conference 2014
Products and Releases  |  2/26/2014  | 
AntiDDoS8000 series protects against application layer, mobile device, and outbound DDoS attacks
Barracuda Sees Growing Market Adoption With Security Offerings On Microsoft Windows Azure
Products and Releases  |  2/26/2014  | 
Provides firewalling and site-to-site secure remote access from on-premises networks to Windows Azure or Vnets within Windows Azure
Trend Micro Delivers Comprehensive Defense With HP Against Targeted Attacks
Products and Releases  |  2/25/2014  | 
Trend Micro Deep Discovery and HP TippingPoint will be combined
RSA Teams With Pivotal To Offer Security Analytics And Big Data Playbook
Products and Releases  |  2/25/2014  | 
New reference architecture provides actionable intelligence needed to detect security threats
RSA Conference 2014 Announces Recipients of 17th Annual Awards For Excellence In Information Security, Excellence In Public Policy & Excellence In Mathematics
Products and Releases  |  2/25/2014  | 
F. Lynn McNulty, first Director of Information Systems Security for the U.S. State Department, received Lifetime Achievement Award
AT&T And IBM Simplify Cyber Security Management
Products and Releases  |  2/25/2014  | 
New joint service will combine security network infrastructure with advanced threat monitoring and analytics
Entrust Integrates 3M Cogent Biometric Technology Into Entrust IdentityGuard Software Authentication Platform
Products and Releases  |  2/25/2014  | 
Collaboration allows organizations to leverage fingerprint biometrics to authenticate users for logical access to workstations
Tufin Survey Reveals 91% Of Security Managers Are Under Pressure To Deliver Applications And Services Faster
Products and Releases  |  2/25/2014  | 
More than three-quarters of respondents believe virtualization will have the biggest impact on security operations during next 12 to 18 months
Fortinet's FortiGuard Labs Reports 96.5% Of All Mobile Malware Tracked Is Android-Based
Products and Releases  |  2/25/2014  | 
Symbian was a distant second at 3.45 percent and iOS, BlackBerry, PalmOS, and Windows together don’t even warrant 1 percent
CA Introduces New Products For Identity And Access Management
Products and Releases  |  2/25/2014  | 
Mobility and API solutions help secure cloud, Web, and mobile applications
Cenzic Announces New Application Security Service For The Connected Enterprise
Products and Releases  |  2/25/2014  | 
Cenzic PASS allows enterprises to define the criteria for acceptably safe partner applications
Webroot Announces BrightCloud Threat Intelligence Services and Endpoint Breach Protection Solution For OEMs And Enterprises
Products and Releases  |  2/24/2014  | 
Cloud-based security offerings address increasing sophistication of online threats
AccessData Introduces Continuous, Automated Incident Resolution Platform
Products and Releases  |  2/24/2014  | 
InSight Platform enables enterprise visibility into network traffic and endpoint data, including mobile devices
CrowdStrike Inc. Partners With IBM To Launch Advanced Cyber Threat Intelligence Service
Products and Releases  |  2/24/2014  | 
Managed service planned for limited initial release in the first half of 2014
Startup BlueBox Launches, Rolls Out New Approach To BYOD Security Problem
Products and Releases  |  2/24/2014  | 
Bluebox SaaS mobile data security solution delivers visibility of corporate data as it moves throughout the mobile workflow
IBM Announces Security Forensics Capabilities To Help Protect Critical Data
Products and Releases  |  2/24/2014  | 
IBM Security QRadar Incident Forensics designed as a module for the QRadar Security Intelligence Platform
McAfee Announces New Product That Stops Advanced Threats In Milliseconds
Products and Releases  |  2/24/2014  | 
At the core of McAfee Threat Intelligence Exchange is a new virtual appliance that connects multiple enterprise security platforms
Removing Admin Rights Mitigates 92% Of Critical Microsoft Vulnerabilities
Products and Releases  |  2/21/2014  | 
New analysis of Patch Tuesday bulletins shows benefits of stripping admin rights
IID Launches ActiveTrust Cyber Threat Sharing And Collaboration Network
Products and Releases  |  2/21/2014  | 
Dozens of Major Enterprises and Government Agencies Quickly Adopt Platform to Control and Coordinate the Latest Cybersecurity Intelligence
Cylance Announces $20 Million in Series B Funding
Products and Releases  |  2/21/2014  | 
Blackstone, Khosla Ventures, Fairhaven Capital and Private Investors Accelerate Cylance's Growth and Advanced Mathematics Platform
ThreatTrack Security Introduces Automated APT Remediation
Products and Releases  |  2/21/2014  | 
New ThreatSecure platform generates custom remediation signatures for newly discovered malware threats, including APTs, targeted attacks and zero-days
Ionic Security Secures $25.5 Million in Series B Funding
Products and Releases  |  2/21/2014  | 
Co-Lead by Google Ventures and Jafco, Leading Security Startup Prepares to Disrupt Traditional Perimeter Security
Deloitte Launches Secure.Vigilant.Resilient
Products and Releases  |  2/21/2014  | 
New approach to cyber risk to help complex organizations reap benefits of growth and innovation
Proofpoint Adds Next-Generation Predictive Defense To Targeted Attack Protection Solution
Products and Releases  |  2/21/2014  | 
Protects users from malware and advanced threats in both URLs and email attachments
Pindrop Security Launches Combined Voice Biometric and Phoneprinting Fraud Detection System
Products and Releases  |  2/20/2014  | 
New Level of Authentication Improves Phone Fraud Detection Capabilities
FireEye Announces Threat Analytics Capabilities for the FireEye Security Platform
Products and Releases  |  2/20/2014  | 
Cloud-based solution enables security teams to identify attacks and accelerate incident response by correlating security event data with FireEye Real-Time Threat Intelligence
Okta Delivers New Identity Offerings to Power Cloud-Based Services
Products and Releases  |  2/20/2014  | 
Jive Software and Advent Software Among Cloud Service Providers Using Okta to Address Range of Identity-Related Needs for Innovative Cloud Offerings
CyberArk Launches Enhanced CyberArk DNA to Detect Pass-the-Hash Vulnerabilities
Products and Releases  |  2/19/2014  | 
Discovery and Audit Tool to Identify and Map Exposed Password Hashes and Vulnerable Machines on a Network; Free Trial Available for Limited Time
AlgoSec Partners With Qualys
Products and Releases  |  2/19/2014  | 
New Integration Delivers Application-Centric Vulnerability Management, Aggregating and Scoring Vulnerabilities Based on Risk and Continuously Monitoring for Changes within Data Center Environments
SANS-Norse Cyberthreat Report Reveals that Cyberattacks Are Causing an Epidemic of Compromises at Healthcare Organizations
Products and Releases  |  2/19/2014  | 
Norse Global Threat Intelligence Platform Identifies Healthcare Organizations' Compromised Networks, Applications, Devices and Systems
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.