Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2018
Yubico and Duo Security Accelerate Federal Cybersecurity Modernization and Smart Card Replacement
Products and Releases  |  3/28/2018  | 
Revisions to federal cybersecurity requirements open door for transition to modern and more effective methods to secure government data
Registration Open for U.S. Cyber Challenges Annual Cyber Quests Competition
Products and Releases  |  3/28/2018  | 
Top Competitors to Qualify for Summer 2018 Cyber Camps
Report: Macro-less Word Document Attacks on the Rise, Zero Day Malware Variants Jump 167 Percent
Products and Releases  |  3/28/2018  | 
WatchGuard Launches Threat Landscape visualization tool for analyzing Firebox Feed data to better understand security threats
Carbon Black Unveils Cb Integration Network, Delivering Cybersecurity via Open APIs
Products and Releases  |  3/28/2018  | 
80+ technology partners have built more than 120 supported integrations by leveraging Carbon Blacks open APIs
ForgeRock Partners with Trusona to Bring #NoPasswords Authentication to Global Companies and Their Customers
Products and Releases  |  3/28/2018  | 
Integration Introduces Frictionless Login Experience to Improve Customer Satisfaction, Increase Security and Decrease Costs
Companies with Secure Email to Gain Unlimited Free Brand Impressions
Products and Releases  |  3/27/2018  | 
New BIMI Standard Puts Company Logos on Authentic Email Messages, Increasing Trust
XM Cyber Unveils First Automated APT Simulation Platform to Continuously Expose All Attack Vectors and Prioritize Actionable Remediation
Products and Releases  |  3/22/2018  | 
Operating as a fully automated purple team, XM Cyber combines red and blue teaming processes to always stay ahead of the hacker
Cofense Malware Review Covers Trends and Predictions on Malware, Delivery Methods and Trending Attacks
Products and Releases  |  3/22/2018  | 
Abuse of legitimate software, rapid exploitation of disclosed vulnerabilities and dynamic phishing techniques increase infection rates, according to the report
Tax Software Providers Not Protecting Emails from Phishing and Spoofing
Products and Releases  |  3/21/2018  | 
Half of Top 8 Tax Software Providers Leave Consumers Vulnerable to Email-Borne Attacks That Can Lead to Identity and Bank Account Theft Customers of H&R Block, TaxAct, Turbo Tax and Free Tax USA Most Susceptible
Kaspersky Lab finds Prilex POS malware evolving to target chip and PIN-protected cards
Products and Releases  |  3/20/2018  | 
The group behind the Prilex point-of-sale (POS) malware can now turn stolen credit card data into functional plastic cards according to the latest research from Kaspersky Labs.
UpGuard Launches Breachsight Breach Discovery Engine
Products and Releases  |  3/20/2018  | 
Cyber risk company unveils solution to locate, analyze, and remediate data exposures
PCI SSC Announces Changes to Qualified Integrators and Resellers Program
Products and Releases  |  3/14/2018  | 
The changes are designed to improve payment data security and reduce merchants' risk.
The Industrial Internet Consortium Releases the Endpoint Security Best Practices White Paper
Products and Releases  |  3/12/2018  | 
Simplifies Guidance for Improving IIoT Endpoint Security
Cyberattacks Get Pricy: Growing Companies Turn to Outsourced Solutions
Products and Releases  |  3/7/2018  | 
Arctic Wolf Networks Selected by Trusource Labs for SOC-as-a-Service.
Bandura Systems Closes $3.5 Million Seed Round
Products and Releases  |  3/7/2018  | 
Company that pioneered Threat Intelligence Gateways for US government expands executive team, announces dual headquarters
Netskope Expands Commitment to Enterprise Security with New Office of the CSO
Products and Releases  |  3/1/2018  | 
Industry veteran Jason Clark joins company to lead new team
Intersections Inc. Launches Data Breach Readiness Program for Small and Medium Sized Businesses
Products and Releases  |  3/1/2018  | 
Specifically designed to help manage cyber threats and prepare businesses for data breach
KnowBe4 Issues 2018 Threat Impact and Endpoint Protection Report
Products and Releases  |  3/1/2018  | 
Midmarket and Enterprise Organizations Are the Hardest Hit with Ransomware and External Malware
Bugcrowd Secures $26 Million
Products and Releases  |  3/1/2018  | 


Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13545
PUBLISHED: 2019-10-18
In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.
CVE-2019-13541
PUBLISHED: 2019-10-18
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.
CVE-2019-17367
PUBLISHED: 2019-10-18
OpenWRT firmware version 18.06.4 is vulnerable to CSRF via wireless/radio0.network1, wireless/radio1.network1, firewall, firewall/zones, firewall/forwards, firewall/rules, network/wan, network/wan6, or network/lan under /cgi-bin/luci/admin/network/.
CVE-2019-17393
PUBLISHED: 2019-10-18
The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and pa...
CVE-2019-17526
PUBLISHED: 2019-10-18
** DISPUTED ** An issue was discovered in SageMath Sage Cell Server through 2019-10-05. Python Code Injection can occur in the context of an internet facing web application. Malicious actors can execute arbitrary commands on the underlying operating system, as demonstrated by an __import__('os').pop...