Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2016
GuardiCore Extends Its Data Center Security Platform
Products and Releases  |  2/29/2016  | 
New GuardiCore Reveal™ Adds Process-Level Visibility into Applications and Workloads Inside the Data Center
DDoS, Web Attacks Surge; Repeat Attacks Become the Norm
Products and Releases  |  2/29/2016  | 
ew Cloud Security Stats, Trends Shared in the Q4 2015 State of the Internet - Security Report
New Report Identifies Broken Communication in Cybersecurity Board Reporting
Products and Releases  |  2/29/2016  | 
Reporting to the Board: Where CISOs and the Board are Missing the Mark” Reveals Majority of IT and Security Executives Say Information They Provide is Not Actionable
No-footprint data on mobile; mobile security's new frontier from Avast
Products and Releases  |  2/26/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers’ personal privacy
CloudFlare Introduces the Industry’s First Security-Focused Registrar
Products and Releases  |  2/26/2016  | 
Designed for Security, Not the Masses, CloudFlare Registrar is the first ICANN-Accredited Registrar Built for High-Profile Domains
BrightPoint Security Threat Intelligence Exchange Speeds Machine-Learning Results
Products and Releases  |  2/26/2016  | 
Intel Security ESM and Tanium Broaden Range of Technologies Now Available to Advance Cyber Campaign Insight and Overview of Threat Trends
Security Researchers Discover Over 2.3 Million New Android Malware Samples in 2015
Products and Releases  |  2/24/2016  | 
G DATA Releases Mobile Malware Report for the Fourth Quarter of 2015
2016 Vormetric Data Threat Report Finds 91% of Global Organizations Feel Vulnerable to Data Threats
Products and Releases  |  2/24/2016  | 
Enterprises and Governments focusing on compliance ahead of breach prevention; investing in technologies that do not prevent data breaches
Exabeam Launches Threat Hunter to Root Out Cybercriminals on Corporate Networks
Products and Releases  |  2/21/2016  | 
Behavioral Search Solution Empowers Any Security Professional to Identify and Stop Cybercriminals
ThreatTrack Releases Its Next-Generation Malware Analysis Sandbox
Products and Releases  |  2/17/2016  | 
ThreatAnalyzer 6.0 enables enterprises and government agencies to discover and respond to advanced malware evading their signature-based defenses
No-footprint Data on Mobile; Mobile Security's New Frontier From Avast
Products and Releases  |  2/17/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers’ personal privacy
Wombat Security Launches PhishAlarm Analyzer
Products and Releases  |  2/17/2016  | 
New solution uses machine learning to recognize phishing attacks allowing security response teams to remediate reported attacks efficiently.
Fully Integrated, Threat-Focused Next-Generation Firewall from Cisco Enhances Protection from the Endpoints and Network to the Cloud
Products and Releases  |  2/16/2016  | 
Innovations in Next-Generation Firewall Platform and New Security Segmentation Service Empower Customers to Better Defend Against Advanced Threats
HTC Selects Keeper to Enhance Mobile Device Security
Products and Releases  |  2/16/2016  | 
buguroo bugThreats Uses Aggressive Hacker Countermeasures to Identify Compromised End Users, Stolen Data and the Cybercriminals’ Next Moves
Products and Releases  |  2/16/2016  | 
Launch of comprehensive threat intelligence platform marks company’s entrance into U.S. market
iovation Shares Data on Online Dating Scams and Mobile Usage Ahead of Valentine’s Day
Products and Releases  |  2/11/2016  | 
Firm names top types of dating fraud leading to lonely hearts and catfish scams
Rubicon Labs Debuts TLS Armor™ Security & Trust Platform for Cloud-based Data Centers
Products and Releases  |  2/11/2016  | 
Massively Scalable, Compact, Zero Knowledge Platform Makes Keys Invisible to Senders, Receivers, Would-Be Hackers. Creates and Validates Identity for Cloud, IoT, and M2M for Extremely Robust, Accelerated and Low-Power Security.
NopSec Makes Security Threat Remediation Easier With Unified VRM 4.0
Products and Releases  |  2/11/2016  | 
Vulnerability Management Innovator Helps Organizations Become More Proactive and Avoid Data Breaches
NextNine OT security management platform auto-discovers lower level industrial assets
Products and Releases  |  2/8/2016  | 
Platform enhances SCADA device visibility down to PLC and RTU level
Symantec Announces $500 Million Strategic Investment by Silver Lake, Symantec’s Total Capital Return Program Increased to $5.5 Billion
Products and Releases  |  2/4/2016  | 
Board to appoint Silver Lake Managing Partner Ken Hao to Symantec Board
Tripwire Study: Two-Thirds of Energy Sector IT Professionals Lack Visibility into Cyber Attacks That Cause Physical Damage
Products and Releases  |  2/4/2016  | 
Only 35 percent of energy IT professionals accurately track all threats targeting their operational technology
PatternEx Launches Company With First Artificial Intelligent Security Analyst
Products and Releases  |  2/3/2016  | 
Unique Artificial Intelligence Solution That Leverages Analyst Intuition to Predict Existing and Emerging Cyber Attacks in Real Time With 10 Times Better Detection Rates and 5 Times Fewer False Positives
Promisec Partners with Performanta to Expand Global Reach
Products and Releases  |  2/3/2016  | 
Partnership Strengthens Promisec’s MSSP Partner Program
Ntrepid Strives to Protect OPM Breach Victims from Further Harm
Products and Releases  |  2/3/2016  | 
Passages Provides Complete Protection From Web-based Attacks, Isolating All Browsing Activity From the User’s Computer
Zenedge Brings Enterprise-Grade WAF and DDoS Protection to SMBs
Products and Releases  |  2/3/2016  | 
ZENEDGE Express™ Delivers Affordable Behavior-Based Cyber Protection for SMBs
Grid Management Working Group Formed as Utility Solutions Are Sought To Address DER Deployment
Products and Releases  |  2/3/2016  | 
Smart Grid Interoperability Panel (SGIP) Leads Utility-Focused Consortium Group
Skybox Security Gets $96 Million Investment from Providence Equity to Fuel Growth
Products and Releases  |  2/3/2016  | 
The fast-growing security analytics company will use funds to further strengthen routes to market, expand hiring and accelerate technological innovation.
SpiderOak Semaphor to Give Team Collaboration What It’s Missing: Privacy
Products and Releases  |  2/1/2016  | 
As teams rush onto the next wave of workplace collaboration, Semaphor delivers the industry’s first Zero Knowledge, private collaboration tool
DarkMatter’s Cyber Network Defence expert, Stephen Brennan, confirmed as keynote presenter at global industry events
Products and Releases  |  2/1/2016  | 
Stephen to talk on the ‘Security of Everything’ in Abu Dhabi, and ‘Ghosts in the Shadows’ in San Francisco


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...