Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2016
GuardiCore Extends Its Data Center Security Platform
Products and Releases  |  2/29/2016  | 
New GuardiCore Reveal Adds Process-Level Visibility into Applications and Workloads Inside the Data Center
DDoS, Web Attacks Surge; Repeat Attacks Become the Norm
Products and Releases  |  2/29/2016  | 
ew Cloud Security Stats, Trends Shared in the Q4 2015 State of the Internet - Security Report
New Report Identifies Broken Communication in Cybersecurity Board Reporting
Products and Releases  |  2/29/2016  | 
Reporting to the Board: Where CISOs and the Board are Missing the Mark Reveals Majority of IT and Security Executives Say Information They Provide is Not Actionable
No-footprint data on mobile; mobile security's new frontier from Avast
Products and Releases  |  2/26/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers personal privacy
CloudFlare Introduces the Industrys First Security-Focused Registrar
Products and Releases  |  2/26/2016  | 
Designed for Security, Not the Masses, CloudFlare Registrar is the first ICANN-Accredited Registrar Built for High-Profile Domains
BrightPoint Security Threat Intelligence Exchange Speeds Machine-Learning Results
Products and Releases  |  2/26/2016  | 
Intel Security ESM and Tanium Broaden Range of Technologies Now Available to Advance Cyber Campaign Insight and Overview of Threat Trends
Security Researchers Discover Over 2.3 Million New Android Malware Samples in 2015
Products and Releases  |  2/24/2016  | 
G DATA Releases Mobile Malware Report for the Fourth Quarter of 2015
2016 Vormetric Data Threat Report Finds 91% of Global Organizations Feel Vulnerable to Data Threats
Products and Releases  |  2/24/2016  | 
Enterprises and Governments focusing on compliance ahead of breach prevention; investing in technologies that do not prevent data breaches
Exabeam Launches Threat Hunter to Root Out Cybercriminals on Corporate Networks
Products and Releases  |  2/21/2016  | 
Behavioral Search Solution Empowers Any Security Professional to Identify and Stop Cybercriminals
ThreatTrack Releases Its Next-Generation Malware Analysis Sandbox
Products and Releases  |  2/17/2016  | 
ThreatAnalyzer 6.0 enables enterprises and government agencies to discover and respond to advanced malware evading their signature-based defenses
No-footprint Data on Mobile; Mobile Security's New Frontier From Avast
Products and Releases  |  2/17/2016  | 
Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers personal privacy
Wombat Security Launches PhishAlarm Analyzer
Products and Releases  |  2/17/2016  | 
New solution uses machine learning to recognize phishing attacks allowing security response teams to remediate reported attacks efficiently.
Fully Integrated, Threat-Focused Next-Generation Firewall from Cisco Enhances Protection from the Endpoints and Network to the Cloud
Products and Releases  |  2/16/2016  | 
Innovations in Next-Generation Firewall Platform and New Security Segmentation Service Empower Customers to Better Defend Against Advanced Threats
HTC Selects Keeper to Enhance Mobile Device Security
Products and Releases  |  2/16/2016  | 
buguroo bugThreats Uses Aggressive Hacker Countermeasures to Identify Compromised End Users, Stolen Data and the Cybercriminals Next Moves
Products and Releases  |  2/16/2016  | 
Launch of comprehensive threat intelligence platform marks companys entrance into U.S. market
iovation Shares Data on Online Dating Scams and Mobile Usage Ahead of Valentines Day
Products and Releases  |  2/11/2016  | 
Firm names top types of dating fraud leading to lonely hearts and catfish scams
Rubicon Labs Debuts TLS Armor Security & Trust Platform for Cloud-based Data Centers
Products and Releases  |  2/11/2016  | 
Massively Scalable, Compact, Zero Knowledge Platform Makes Keys Invisible to Senders, Receivers, Would-Be Hackers. Creates and Validates Identity for Cloud, IoT, and M2M for Extremely Robust, Accelerated and Low-Power Security.
NopSec Makes Security Threat Remediation Easier With Unified VRM 4.0
Products and Releases  |  2/11/2016  | 
Vulnerability Management Innovator Helps Organizations Become More Proactive and Avoid Data Breaches
NextNine OT security management platform auto-discovers lower level industrial assets
Products and Releases  |  2/8/2016  | 
Platform enhances SCADA device visibility down to PLC and RTU level
Symantec Announces $500 Million Strategic Investment by Silver Lake, Symantecs Total Capital Return Program Increased to $5.5 Billion
Products and Releases  |  2/4/2016  | 
Board to appoint Silver Lake Managing Partner Ken Hao to Symantec Board
Tripwire Study: Two-Thirds of Energy Sector IT Professionals Lack Visibility into Cyber Attacks That Cause Physical Damage
Products and Releases  |  2/4/2016  | 
Only 35 percent of energy IT professionals accurately track all threats targeting their operational technology
PatternEx Launches Company With First Artificial Intelligent Security Analyst
Products and Releases  |  2/3/2016  | 
Unique Artificial Intelligence Solution That Leverages Analyst Intuition to Predict Existing and Emerging Cyber Attacks in Real Time With 10 Times Better Detection Rates and 5 Times Fewer False Positives
Promisec Partners with Performanta to Expand Global Reach
Products and Releases  |  2/3/2016  | 
Partnership Strengthens Promisecs MSSP Partner Program
Ntrepid Strives to Protect OPM Breach Victims from Further Harm
Products and Releases  |  2/3/2016  | 
Passages Provides Complete Protection From Web-based Attacks, Isolating All Browsing Activity From the Users Computer
Zenedge Brings Enterprise-Grade WAF and DDoS Protection to SMBs
Products and Releases  |  2/3/2016  | 
ZENEDGE Express Delivers Affordable Behavior-Based Cyber Protection for SMBs
Grid Management Working Group Formed as Utility Solutions Are Sought To Address DER Deployment
Products and Releases  |  2/3/2016  | 
Smart Grid Interoperability Panel (SGIP) Leads Utility-Focused Consortium Group
Skybox Security Gets $96 Million Investment from Providence Equity to Fuel Growth
Products and Releases  |  2/3/2016  | 
The fast-growing security analytics company will use funds to further strengthen routes to market, expand hiring and accelerate technological innovation.
SpiderOak Semaphor to Give Team Collaboration What Its Missing: Privacy
Products and Releases  |  2/1/2016  | 
As teams rush onto the next wave of workplace collaboration, Semaphor delivers the industrys first Zero Knowledge, private collaboration tool
DarkMatters Cyber Network Defence expert, Stephen Brennan, confirmed as keynote presenter at global industry events
Products and Releases  |  2/1/2016  | 
Stephen to talk on the Security of Everything in Abu Dhabi, and Ghosts in the Shadows in San Francisco


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21196
PUBLISHED: 2021-04-09
Heap buffer overflow in TabStrip in Google Chrome on Windows prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21197
PUBLISHED: 2021-04-09
Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.