Products and Releases

Content posted in March 2018
Yubico and Duo Security Accelerate Federal Cybersecurity Modernization and Smart Card Replacement
Products and Releases  |  3/28/2018  | 
Revisions to federal cybersecurity requirements open door for transition to modern and more effective methods to secure government data
Registration Open for U.S. Cyber Challenges Annual Cyber Quests Competition
Products and Releases  |  3/28/2018  | 
Top Competitors to Qualify for Summer 2018 Cyber Camps
Report: Macro-less Word Document Attacks on the Rise, Zero Day Malware Variants Jump 167 Percent
Products and Releases  |  3/28/2018  | 
WatchGuard Launches Threat Landscape visualization tool for analyzing Firebox Feed data to better understand security threats
Carbon Black Unveils Cb Integration Network, Delivering Cybersecurity via Open APIs
Products and Releases  |  3/28/2018  | 
80+ technology partners have built more than 120 supported integrations by leveraging Carbon Blacks open APIs
ForgeRock Partners with Trusona to Bring #NoPasswords Authentication to Global Companies and Their Customers
Products and Releases  |  3/28/2018  | 
Integration Introduces Frictionless Login Experience to Improve Customer Satisfaction, Increase Security and Decrease Costs
Companies with Secure Email to Gain Unlimited Free Brand Impressions
Products and Releases  |  3/27/2018  | 
New BIMI Standard Puts Company Logos on Authentic Email Messages, Increasing Trust
XM Cyber Unveils First Automated APT Simulation Platform to Continuously Expose All Attack Vectors and Prioritize Actionable Remediation
Products and Releases  |  3/22/2018  | 
Operating as a fully automated purple team, XM Cyber combines red and blue teaming processes to always stay ahead of the hacker
Cofense Malware Review Covers Trends and Predictions on Malware, Delivery Methods and Trending Attacks
Products and Releases  |  3/22/2018  | 
Abuse of legitimate software, rapid exploitation of disclosed vulnerabilities and dynamic phishing techniques increase infection rates, according to the report
Tax Software Providers Not Protecting Emails from Phishing and Spoofing
Products and Releases  |  3/21/2018  | 
Half of Top 8 Tax Software Providers Leave Consumers Vulnerable to Email-Borne Attacks That Can Lead to Identity and Bank Account Theft Customers of H&R Block, TaxAct, Turbo Tax and Free Tax USA Most Susceptible
Kaspersky Lab finds Prilex POS malware evolving to target chip and PIN-protected cards
Products and Releases  |  3/20/2018  | 
The group behind the Prilex point-of-sale (POS) malware can now turn stolen credit card data into functional plastic cards according to the latest research from Kaspersky Labs.
UpGuard Launches Breachsight Breach Discovery Engine
Products and Releases  |  3/20/2018  | 
Cyber risk company unveils solution to locate, analyze, and remediate data exposures
PCI SSC Announces Changes to Qualified Integrators and Resellers Program
Products and Releases  |  3/14/2018  | 
The changes are designed to improve payment data security and reduce merchants' risk.
The Industrial Internet Consortium Releases the Endpoint Security Best Practices White Paper
Products and Releases  |  3/12/2018  | 
Simplifies Guidance for Improving IIoT Endpoint Security
Cyberattacks Get Pricy: Growing Companies Turn to Outsourced Solutions
Products and Releases  |  3/7/2018  | 
Arctic Wolf Networks Selected by Trusource Labs for SOC-as-a-Service.
Bandura Systems Closes $3.5 Million Seed Round
Products and Releases  |  3/7/2018  | 
Company that pioneered Threat Intelligence Gateways for US government expands executive team, announces dual headquarters
Netskope Expands Commitment to Enterprise Security with New Office of the CSO
Products and Releases  |  3/1/2018  | 
Industry veteran Jason Clark joins company to lead new team
Intersections Inc. Launches Data Breach Readiness Program for Small and Medium Sized Businesses
Products and Releases  |  3/1/2018  | 
Specifically designed to help manage cyber threats and prepare businesses for data breach
KnowBe4 Issues 2018 Threat Impact and Endpoint Protection Report
Products and Releases  |  3/1/2018  | 
Midmarket and Enterprise Organizations Are the Hardest Hit with Ransomware and External Malware
Bugcrowd Secures $26 Million
Products and Releases  |  3/1/2018  | 


Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20201
PUBLISHED: 2018-12-18
There is a stack-based buffer over-read in the jsfNameFromString function of jsflash.c in Espruino 2V00, leading to a denial of service or possibly unspecified other impact via a crafted js file.
CVE-2018-20194
PUBLISHED: 2018-12-18
There is a stack-based buffer underflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because limiting the additional noise energy l...
CVE-2018-20195
PUBLISHED: 2018-12-18
A NULL pointer dereference was discovered in ic_predict of libfaad/ic_predict.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
CVE-2018-20196
PUBLISHED: 2018-12-18
There is a stack-based buffer overflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because the S_M array is mishandled.
CVE-2018-20197
PUBLISHED: 2018-12-18
There is a stack-based buffer underflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because limiting the additional noise energy l...