Products and Releases

Content posted in February 2016
GuardiCore Extends Its Data Center Security Platform
Products and Releases  |  2/29/2016  | 
New GuardiCore Reveal Adds Process-Level Visibility into Applications and Workloads Inside the Data Center
DDoS, Web Attacks Surge; Repeat Attacks Become the Norm
Products and Releases  |  2/29/2016  | 
ew Cloud Security Stats, Trends Shared in the Q4 2015 State of the Internet - Security Report
New Report Identifies Broken Communication in Cybersecurity Board Reporting
Products and Releases  |  2/29/2016  | 
Reporting to the Board: Where CISOs and the Board are Missing the Mark Reveals Majority of IT and Security Executives Say Information They Provide is Not Actionable
No-footprint data on mobile; mobile security's new frontier from Avast
Products and Releases  |  2/26/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers personal privacy
CloudFlare Introduces the Industrys First Security-Focused Registrar
Products and Releases  |  2/26/2016  | 
Designed for Security, Not the Masses, CloudFlare Registrar is the first ICANN-Accredited Registrar Built for High-Profile Domains
BrightPoint Security Threat Intelligence Exchange Speeds Machine-Learning Results
Products and Releases  |  2/26/2016  | 
Intel Security ESM and Tanium Broaden Range of Technologies Now Available to Advance Cyber Campaign Insight and Overview of Threat Trends
Security Researchers Discover Over 2.3 Million New Android Malware Samples in 2015
Products and Releases  |  2/24/2016  | 
G DATA Releases Mobile Malware Report for the Fourth Quarter of 2015
2016 Vormetric Data Threat Report Finds 91% of Global Organizations Feel Vulnerable to Data Threats
Products and Releases  |  2/24/2016  | 
Enterprises and Governments focusing on compliance ahead of breach prevention; investing in technologies that do not prevent data breaches
Exabeam Launches Threat Hunter to Root Out Cybercriminals on Corporate Networks
Products and Releases  |  2/21/2016  | 
Behavioral Search Solution Empowers Any Security Professional to Identify and Stop Cybercriminals
ThreatTrack Releases Its Next-Generation Malware Analysis Sandbox
Products and Releases  |  2/17/2016  | 
ThreatAnalyzer 6.0 enables enterprises and government agencies to discover and respond to advanced malware evading their signature-based defenses
No-footprint Data on Mobile; Mobile Security's New Frontier From Avast
Products and Releases  |  2/17/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers personal privacy
Wombat Security Launches PhishAlarm Analyzer
Products and Releases  |  2/17/2016  | 
New solution uses machine learning to recognize phishing attacks allowing security response teams to remediate reported attacks efficiently.
Fully Integrated, Threat-Focused Next-Generation Firewall from Cisco Enhances Protection from the Endpoints and Network to the Cloud
Products and Releases  |  2/16/2016  | 
Innovations in Next-Generation Firewall Platform and New Security Segmentation Service Empower Customers to Better Defend Against Advanced Threats
HTC Selects Keeper to Enhance Mobile Device Security
Products and Releases  |  2/16/2016  | 
buguroo bugThreats Uses Aggressive Hacker Countermeasures to Identify Compromised End Users, Stolen Data and the Cybercriminals Next Moves
Products and Releases  |  2/16/2016  | 
Launch of comprehensive threat intelligence platform marks companys entrance into U.S. market
iovation Shares Data on Online Dating Scams and Mobile Usage Ahead of Valentines Day
Products and Releases  |  2/11/2016  | 
Firm names top types of dating fraud leading to lonely hearts and catfish scams
Rubicon Labs Debuts TLS Armor Security & Trust Platform for Cloud-based Data Centers
Products and Releases  |  2/11/2016  | 
Massively Scalable, Compact, Zero Knowledge Platform Makes Keys Invisible to Senders, Receivers, Would-Be Hackers. Creates and Validates Identity for Cloud, IoT, and M2M for Extremely Robust, Accelerated and Low-Power Security.
NopSec Makes Security Threat Remediation Easier With Unified VRM 4.0
Products and Releases  |  2/11/2016  | 
Vulnerability Management Innovator Helps Organizations Become More Proactive and Avoid Data Breaches
NextNine OT security management platform auto-discovers lower level industrial assets
Products and Releases  |  2/8/2016  | 
Platform enhances SCADA device visibility down to PLC and RTU level
Symantec Announces $500 Million Strategic Investment by Silver Lake, Symantecs Total Capital Return Program Increased to $5.5 Billion
Products and Releases  |  2/4/2016  | 
Board to appoint Silver Lake Managing Partner Ken Hao to Symantec Board
Tripwire Study: Two-Thirds of Energy Sector IT Professionals Lack Visibility into Cyber Attacks That Cause Physical Damage
Products and Releases  |  2/4/2016  | 
Only 35 percent of energy IT professionals accurately track all threats targeting their operational technology
PatternEx Launches Company With First Artificial Intelligent Security Analyst
Products and Releases  |  2/3/2016  | 
Unique Artificial Intelligence Solution That Leverages Analyst Intuition to Predict Existing and Emerging Cyber Attacks in Real Time With 10 Times Better Detection Rates and 5 Times Fewer False Positives
Promisec Partners with Performanta to Expand Global Reach
Products and Releases  |  2/3/2016  | 
Partnership Strengthens Promisecs MSSP Partner Program
Ntrepid Strives to Protect OPM Breach Victims from Further Harm
Products and Releases  |  2/3/2016  | 
Passages Provides Complete Protection From Web-based Attacks, Isolating All Browsing Activity From the Users Computer
Zenedge Brings Enterprise-Grade WAF and DDoS Protection to SMBs
Products and Releases  |  2/3/2016  | 
ZENEDGE Express Delivers Affordable Behavior-Based Cyber Protection for SMBs
Grid Management Working Group Formed as Utility Solutions Are Sought To Address DER Deployment
Products and Releases  |  2/3/2016  | 
Smart Grid Interoperability Panel (SGIP) Leads Utility-Focused Consortium Group
Skybox Security Gets $96 Million Investment from Providence Equity to Fuel Growth
Products and Releases  |  2/3/2016  | 
The fast-growing security analytics company will use funds to further strengthen routes to market, expand hiring and accelerate technological innovation.
SpiderOak Semaphor to Give Team Collaboration What Its Missing: Privacy
Products and Releases  |  2/1/2016  | 
As teams rush onto the next wave of workplace collaboration, Semaphor delivers the industrys first Zero Knowledge, private collaboration tool
DarkMatters Cyber Network Defence expert, Stephen Brennan, confirmed as keynote presenter at global industry events
Products and Releases  |  2/1/2016  | 
Stephen to talk on the Security of Everything in Abu Dhabi, and Ghosts in the Shadows in San Francisco


New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Google to Delete 'Secure' Label from HTTPS Sites
Kelly Sheridan, Staff Editor, Dark Reading,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The one you have not seen, won't be remembered".
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-9317
PUBLISHED: 2018-05-23
Privilege escalation vulnerability found in some Dahua IP devices. Attacker in possession of low privilege account can gain access to credential information of high privilege account and further obtain device information or attack the device.
CVE-2018-1193
PUBLISHED: 2018-05-23
Cloud Foundry routing-release, versions prior to 0.175.0, lacks sanitization for user-provided X-Forwarded-Proto headers. A remote user can set the X-Forwarded-Proto header in a request to potentially bypass an application requirement to only respond over secure connections.
CVE-2018-1122
PUBLISHED: 2018-05-23
procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
CVE-2018-1123
PUBLISHED: 2018-05-23
procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
CVE-2018-1125
PUBLISHED: 2018-05-23
procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.