Products and Releases

Content posted in February 2015
Emailage Raises $3.8 Million
Products and Releases  |  2/26/2015  | 
Funding is led by Felicis Ventures, the leader in early-stage startup funding with an aggregate enterprise investment exit value of $7.5 billion
BMC and Qualys Join Forces to Improve Enterprise Security
Products and Releases  |  2/26/2015  | 
Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify and remediate threats and boost collaboration between Security and IT Operations teams
Onapsis Uncovers Five New Vulnerabilities Affecting SAP BusinessObjects and SAP HANA
Products and Releases  |  2/25/2015  | 
High-profile cyber-risks reveal unauthorized users could retrieve and overwrite data stored on business-critical systems
Lumeta Announces Strategic Partnership with Nordisk Systems, Inc.
Products and Releases  |  2/24/2015  | 
Offers Customers a Solution to Network Situational Awareness Challenges
Digital Guardian Launches Digital Guardian 7.0 for Data Protection Against All Threats
Products and Releases  |  2/24/2015  | 
Company Extends Proven Data Protection Capabilities for Insider Threats to Defend Against Outside Attacks and Bridge the Gap Between Systems Security and Data Protection
Onapsis Appoints CTO of Veracode, Chris Wysopal, to Board of Advisors
Products and Releases  |  2/23/2015  | 
Cyber security expert, thought leader and entrepreneur to help Onapsis further transform how organizations approach business-critical application security
Tenable Network Security Introduces Agent-Based Scanning to 2015 Product Line with Debut of Nessus Manager
Products and Releases  |  2/20/2015  | 
Nessus Agents simplify, automate and extend vulnerability management capabilities by performing offline scans of portable devices without the need for privileged credentials
Fluke Networks Makes Dynamic Responses to Wireless Threats and True No-Wireless Zones Realities with New Capabilities in AirMagnet Enterprise
Products and Releases  |  2/20/2015  | 
For the organizations that need it most, AirMagnet Enterprise provides nonstop detection, location, alerting, mitigation and reporting on cellular and Wi-Fi security breaches
Pindrop Security Closes $35 Million Investment to Extend Leadership in Call Center Anti-Fraud and Authentication
Products and Releases  |  2/19/2015  | 
Institutional Venture Partners leads funding round along with existing investors Andreessen Horowitz, Citi Ventures, Felicis Ventures and Redpoint Ventures
With $7M in New Funding, Sqrrl Launches Linked Data Analysis Platform
Products and Releases  |  2/19/2015  | 
Sqrrl centers its focus on uniting cybersecurity incident detection and response
UVI Awarded Five-Year $1.3M U.S. DOE Cybersecurity Grant
Products and Releases  |  2/18/2015  | 
The Cybersecurity Workforce Pipeline will create a consortium composed of 13 Historically Black Colleges and Universities (HBCUs), two national labs, and a k-12 school district.
Snow Software fuels global success story with acquisition of Mobile Device Management technology developer
Products and Releases  |  2/18/2015  | 
The Institution and its Revival MDM solution joins Snow family
ID Experts and Iatric Systems Offer Hospitals A Proactive Solution for Identifying and Managing Security Incidents
Products and Releases  |  2/18/2015  | 
Integrating Iatric Systems Security Audit Manager(TM) and ID Experts' RADAR Identifies, Automates, and Simplifies the Complexities of Data Incident Response Management
OpenDNS Discovers New, Highly Sophisticated PayPal Phishing Campaign
Products and Releases  |  2/13/2015  | 
Phishing Websites Virtually Indistinguishable from Paypals Legitimate Properties
Gemalto Releases Findings of 2014 Breach Level Index
Products and Releases  |  2/13/2015  | 
Data breaches increased 49 percent in 2014 to 1 billion data records compromised, with cybercriminals targeting identity theft as top breach category
Sharp rise in DNS-based DDoS last year signals larger, more frequent attacks in 2015
Products and Releases  |  2/5/2015  | 
Malware in home gateways topples provider networks & websites; rapid growth of smart devices adds to risk
Lastline Partners with Bit9 + Carbon Black to Deliver Comprehensive Network and Endpoint Breach Protection
Products and Releases  |  2/3/2015  | 
Product Integration Provides End-to-End Coverage Against Advanced and Evasive Malware
Epicor Introduces New Data Security and Protection Program for Independent Retailers
Products and Releases  |  2/3/2015  | 
Initiative Designed to Mitigate the Risk of a Security Breach through Improved Data Management and Protection to Boost Consumer Confidence and Loyalty
CipherCloud Report Identifies over 1,100 Cloud Applications in Use by Companies, 86 Percent of Cloud Applications are 'Shadow IT'
Products and Releases  |  2/3/2015  | 
North American and European companies use on average 1,245 and 981 applications, respectively
Cardtek USA Unveils New Partnerships for a Smarter and Safer Mobile Payments World in the U.S.
Products and Releases  |  2/3/2015  | 
Through its parent and sister companies, Cardtek USA is developing groundbreaking app softwares, infrastructures to increase data safety, and offering cloud-based mobile service solutions for the increasing demand for smart devices
Qualys Brings Industrys First Continuous Progressive Scanning Capabilities to Its Fast Growing Web Applications Scanning Solution
Products and Releases  |  2/3/2015  | 
New Features Enable Deeper and Comprehensive Continuous Scanning of Large and Complex Web Applications
Marble Security Report: U.S. No. 1 Source of Dangerous Mobile Apps for iPhone and Android
Products and Releases  |  2/3/2015  | 
China, India, Korea and Taiwan are next riskiest sources
Former Liberty Reserve IT Manager Sentenced to 36 Months in Prison
Products and Releases  |  2/2/2015  | 
The former information technology manager for Liberty Reserve was sentenced for conspiring to operate an unlicensed money transmitting business.


13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
From DevOps to DevSecOps: Structuring Communication for Better Security
Robert Hawk, Privacy & Security Lead at xMatters,  2/15/2018
Windows 10 Critical Vulnerability Reports Grew 64% in 2017
Kelly Sheridan, Associate Editor, Dark Reading,  2/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.