Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2016
GuardiCore Extends Its Data Center Security Platform
Products and Releases  |  2/29/2016  | 
New GuardiCore Reveal Adds Process-Level Visibility into Applications and Workloads Inside the Data Center
DDoS, Web Attacks Surge; Repeat Attacks Become the Norm
Products and Releases  |  2/29/2016  | 
ew Cloud Security Stats, Trends Shared in the Q4 2015 State of the Internet - Security Report
New Report Identifies Broken Communication in Cybersecurity Board Reporting
Products and Releases  |  2/29/2016  | 
Reporting to the Board: Where CISOs and the Board are Missing the Mark Reveals Majority of IT and Security Executives Say Information They Provide is Not Actionable
No-footprint data on mobile; mobile security's new frontier from Avast
Products and Releases  |  2/26/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers personal privacy
CloudFlare Introduces the Industrys First Security-Focused Registrar
Products and Releases  |  2/26/2016  | 
Designed for Security, Not the Masses, CloudFlare Registrar is the first ICANN-Accredited Registrar Built for High-Profile Domains
BrightPoint Security Threat Intelligence Exchange Speeds Machine-Learning Results
Products and Releases  |  2/26/2016  | 
Intel Security ESM and Tanium Broaden Range of Technologies Now Available to Advance Cyber Campaign Insight and Overview of Threat Trends
Security Researchers Discover Over 2.3 Million New Android Malware Samples in 2015
Products and Releases  |  2/24/2016  | 
G DATA Releases Mobile Malware Report for the Fourth Quarter of 2015
2016 Vormetric Data Threat Report Finds 91% of Global Organizations Feel Vulnerable to Data Threats
Products and Releases  |  2/24/2016  | 
Enterprises and Governments focusing on compliance ahead of breach prevention; investing in technologies that do not prevent data breaches
Exabeam Launches Threat Hunter to Root Out Cybercriminals on Corporate Networks
Products and Releases  |  2/21/2016  | 
Behavioral Search Solution Empowers Any Security Professional to Identify and Stop Cybercriminals
ThreatTrack Releases Its Next-Generation Malware Analysis Sandbox
Products and Releases  |  2/17/2016  | 
ThreatAnalyzer 6.0 enables enterprises and government agencies to discover and respond to advanced malware evading their signature-based defenses
No-footprint Data on Mobile; Mobile Security's New Frontier From Avast
Products and Releases  |  2/17/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers personal privacy
Wombat Security Launches PhishAlarm Analyzer
Products and Releases  |  2/17/2016  | 
New solution uses machine learning to recognize phishing attacks allowing security response teams to remediate reported attacks efficiently.
Fully Integrated, Threat-Focused Next-Generation Firewall from Cisco Enhances Protection from the Endpoints and Network to the Cloud
Products and Releases  |  2/16/2016  | 
Innovations in Next-Generation Firewall Platform and New Security Segmentation Service Empower Customers to Better Defend Against Advanced Threats
HTC Selects Keeper to Enhance Mobile Device Security
Products and Releases  |  2/16/2016  | 
buguroo bugThreats Uses Aggressive Hacker Countermeasures to Identify Compromised End Users, Stolen Data and the Cybercriminals Next Moves
Products and Releases  |  2/16/2016  | 
Launch of comprehensive threat intelligence platform marks companys entrance into U.S. market
iovation Shares Data on Online Dating Scams and Mobile Usage Ahead of Valentines Day
Products and Releases  |  2/11/2016  | 
Firm names top types of dating fraud leading to lonely hearts and catfish scams
Rubicon Labs Debuts TLS Armor Security & Trust Platform for Cloud-based Data Centers
Products and Releases  |  2/11/2016  | 
Massively Scalable, Compact, Zero Knowledge Platform Makes Keys Invisible to Senders, Receivers, Would-Be Hackers. Creates and Validates Identity for Cloud, IoT, and M2M for Extremely Robust, Accelerated and Low-Power Security.
NopSec Makes Security Threat Remediation Easier With Unified VRM 4.0
Products and Releases  |  2/11/2016  | 
Vulnerability Management Innovator Helps Organizations Become More Proactive and Avoid Data Breaches
NextNine OT security management platform auto-discovers lower level industrial assets
Products and Releases  |  2/8/2016  | 
Platform enhances SCADA device visibility down to PLC and RTU level
Symantec Announces $500 Million Strategic Investment by Silver Lake, Symantecs Total Capital Return Program Increased to $5.5 Billion
Products and Releases  |  2/4/2016  | 
Board to appoint Silver Lake Managing Partner Ken Hao to Symantec Board
Tripwire Study: Two-Thirds of Energy Sector IT Professionals Lack Visibility into Cyber Attacks That Cause Physical Damage
Products and Releases  |  2/4/2016  | 
Only 35 percent of energy IT professionals accurately track all threats targeting their operational technology
PatternEx Launches Company With First Artificial Intelligent Security Analyst
Products and Releases  |  2/3/2016  | 
Unique Artificial Intelligence Solution That Leverages Analyst Intuition to Predict Existing and Emerging Cyber Attacks in Real Time With 10 Times Better Detection Rates and 5 Times Fewer False Positives
Promisec Partners with Performanta to Expand Global Reach
Products and Releases  |  2/3/2016  | 
Partnership Strengthens Promisecs MSSP Partner Program
Ntrepid Strives to Protect OPM Breach Victims from Further Harm
Products and Releases  |  2/3/2016  | 
Passages Provides Complete Protection From Web-based Attacks, Isolating All Browsing Activity From the Users Computer
Zenedge Brings Enterprise-Grade WAF and DDoS Protection to SMBs
Products and Releases  |  2/3/2016  | 
ZENEDGE Express Delivers Affordable Behavior-Based Cyber Protection for SMBs
Grid Management Working Group Formed as Utility Solutions Are Sought To Address DER Deployment
Products and Releases  |  2/3/2016  | 
Smart Grid Interoperability Panel (SGIP) Leads Utility-Focused Consortium Group
Skybox Security Gets $96 Million Investment from Providence Equity to Fuel Growth
Products and Releases  |  2/3/2016  | 
The fast-growing security analytics company will use funds to further strengthen routes to market, expand hiring and accelerate technological innovation.
SpiderOak Semaphor to Give Team Collaboration What Its Missing: Privacy
Products and Releases  |  2/1/2016  | 
As teams rush onto the next wave of workplace collaboration, Semaphor delivers the industrys first Zero Knowledge, private collaboration tool
DarkMatters Cyber Network Defence expert, Stephen Brennan, confirmed as keynote presenter at global industry events
Products and Releases  |  2/1/2016  | 
Stephen to talk on the Security of Everything in Abu Dhabi, and Ghosts in the Shadows in San Francisco


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...