Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2016
GuardiCore Extends Its Data Center Security Platform
Products and Releases  |  2/29/2016  | 
New GuardiCore Reveal™ Adds Process-Level Visibility into Applications and Workloads Inside the Data Center
DDoS, Web Attacks Surge; Repeat Attacks Become the Norm
Products and Releases  |  2/29/2016  | 
ew Cloud Security Stats, Trends Shared in the Q4 2015 State of the Internet - Security Report
New Report Identifies Broken Communication in Cybersecurity Board Reporting
Products and Releases  |  2/29/2016  | 
Reporting to the Board: Where CISOs and the Board are Missing the Mark” Reveals Majority of IT and Security Executives Say Information They Provide is Not Actionable
No-footprint data on mobile; mobile security's new frontier from Avast
Products and Releases  |  2/26/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers’ personal privacy
CloudFlare Introduces the Industry’s First Security-Focused Registrar
Products and Releases  |  2/26/2016  | 
Designed for Security, Not the Masses, CloudFlare Registrar is the first ICANN-Accredited Registrar Built for High-Profile Domains
BrightPoint Security Threat Intelligence Exchange Speeds Machine-Learning Results
Products and Releases  |  2/26/2016  | 
Intel Security ESM and Tanium Broaden Range of Technologies Now Available to Advance Cyber Campaign Insight and Overview of Threat Trends
Security Researchers Discover Over 2.3 Million New Android Malware Samples in 2015
Products and Releases  |  2/24/2016  | 
G DATA Releases Mobile Malware Report for the Fourth Quarter of 2015
2016 Vormetric Data Threat Report Finds 91% of Global Organizations Feel Vulnerable to Data Threats
Products and Releases  |  2/24/2016  | 
Enterprises and Governments focusing on compliance ahead of breach prevention; investing in technologies that do not prevent data breaches
Exabeam Launches Threat Hunter to Root Out Cybercriminals on Corporate Networks
Products and Releases  |  2/21/2016  | 
Behavioral Search Solution Empowers Any Security Professional to Identify and Stop Cybercriminals
ThreatTrack Releases Its Next-Generation Malware Analysis Sandbox
Products and Releases  |  2/17/2016  | 
ThreatAnalyzer 6.0 enables enterprises and government agencies to discover and respond to advanced malware evading their signature-based defenses
No-footprint Data on Mobile; Mobile Security's New Frontier From Avast
Products and Releases  |  2/17/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers’ personal privacy
Wombat Security Launches PhishAlarm Analyzer
Products and Releases  |  2/17/2016  | 
New solution uses machine learning to recognize phishing attacks allowing security response teams to remediate reported attacks efficiently.
Fully Integrated, Threat-Focused Next-Generation Firewall from Cisco Enhances Protection from the Endpoints and Network to the Cloud
Products and Releases  |  2/16/2016  | 
Innovations in Next-Generation Firewall Platform and New Security Segmentation Service Empower Customers to Better Defend Against Advanced Threats
HTC Selects Keeper to Enhance Mobile Device Security
Products and Releases  |  2/16/2016  | 
buguroo bugThreats Uses Aggressive Hacker Countermeasures to Identify Compromised End Users, Stolen Data and the Cybercriminals’ Next Moves
Products and Releases  |  2/16/2016  | 
Launch of comprehensive threat intelligence platform marks company’s entrance into U.S. market
iovation Shares Data on Online Dating Scams and Mobile Usage Ahead of Valentine’s Day
Products and Releases  |  2/11/2016  | 
Firm names top types of dating fraud leading to lonely hearts and catfish scams
Rubicon Labs Debuts TLS Armor™ Security & Trust Platform for Cloud-based Data Centers
Products and Releases  |  2/11/2016  | 
Massively Scalable, Compact, Zero Knowledge Platform Makes Keys Invisible to Senders, Receivers, Would-Be Hackers. Creates and Validates Identity for Cloud, IoT, and M2M for Extremely Robust, Accelerated and Low-Power Security.
NopSec Makes Security Threat Remediation Easier With Unified VRM 4.0
Products and Releases  |  2/11/2016  | 
Vulnerability Management Innovator Helps Organizations Become More Proactive and Avoid Data Breaches
NextNine OT security management platform auto-discovers lower level industrial assets
Products and Releases  |  2/8/2016  | 
Platform enhances SCADA device visibility down to PLC and RTU level
Symantec Announces $500 Million Strategic Investment by Silver Lake, Symantec’s Total Capital Return Program Increased to $5.5 Billion
Products and Releases  |  2/4/2016  | 
Board to appoint Silver Lake Managing Partner Ken Hao to Symantec Board
Tripwire Study: Two-Thirds of Energy Sector IT Professionals Lack Visibility into Cyber Attacks That Cause Physical Damage
Products and Releases  |  2/4/2016  | 
Only 35 percent of energy IT professionals accurately track all threats targeting their operational technology
PatternEx Launches Company With First Artificial Intelligent Security Analyst
Products and Releases  |  2/3/2016  | 
Unique Artificial Intelligence Solution That Leverages Analyst Intuition to Predict Existing and Emerging Cyber Attacks in Real Time With 10 Times Better Detection Rates and 5 Times Fewer False Positives
Promisec Partners with Performanta to Expand Global Reach
Products and Releases  |  2/3/2016  | 
Partnership Strengthens Promisec’s MSSP Partner Program
Ntrepid Strives to Protect OPM Breach Victims from Further Harm
Products and Releases  |  2/3/2016  | 
Passages Provides Complete Protection From Web-based Attacks, Isolating All Browsing Activity From the User’s Computer
Zenedge Brings Enterprise-Grade WAF and DDoS Protection to SMBs
Products and Releases  |  2/3/2016  | 
ZENEDGE Express™ Delivers Affordable Behavior-Based Cyber Protection for SMBs
Grid Management Working Group Formed as Utility Solutions Are Sought To Address DER Deployment
Products and Releases  |  2/3/2016  | 
Smart Grid Interoperability Panel (SGIP) Leads Utility-Focused Consortium Group
Skybox Security Gets $96 Million Investment from Providence Equity to Fuel Growth
Products and Releases  |  2/3/2016  | 
The fast-growing security analytics company will use funds to further strengthen routes to market, expand hiring and accelerate technological innovation.
SpiderOak Semaphor to Give Team Collaboration What It’s Missing: Privacy
Products and Releases  |  2/1/2016  | 
As teams rush onto the next wave of workplace collaboration, Semaphor delivers the industry’s first Zero Knowledge, private collaboration tool
DarkMatter’s Cyber Network Defence expert, Stephen Brennan, confirmed as keynote presenter at global industry events
Products and Releases  |  2/1/2016  | 
Stephen to talk on the ‘Security of Everything’ in Abu Dhabi, and ‘Ghosts in the Shadows’ in San Francisco


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file