Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2018
Yubico and Duo Security Accelerate Federal Cybersecurity Modernization and Smart Card Replacement
Products and Releases  |  3/28/2018  | 
Revisions to federal cybersecurity requirements open door for transition to modern and more effective methods to secure government data
Registration Open for U.S. Cyber Challenges Annual Cyber Quests Competition
Products and Releases  |  3/28/2018  | 
Top Competitors to Qualify for Summer 2018 Cyber Camps
Report: Macro-less Word Document Attacks on the Rise, Zero Day Malware Variants Jump 167 Percent
Products and Releases  |  3/28/2018  | 
WatchGuard Launches Threat Landscape visualization tool for analyzing Firebox Feed data to better understand security threats
Carbon Black Unveils Cb Integration Network, Delivering Cybersecurity via Open APIs
Products and Releases  |  3/28/2018  | 
80+ technology partners have built more than 120 supported integrations by leveraging Carbon Blacks open APIs
ForgeRock Partners with Trusona to Bring #NoPasswords Authentication to Global Companies and Their Customers
Products and Releases  |  3/28/2018  | 
Integration Introduces Frictionless Login Experience to Improve Customer Satisfaction, Increase Security and Decrease Costs
Companies with Secure Email to Gain Unlimited Free Brand Impressions
Products and Releases  |  3/27/2018  | 
New BIMI Standard Puts Company Logos on Authentic Email Messages, Increasing Trust
XM Cyber Unveils First Automated APT Simulation Platform to Continuously Expose All Attack Vectors and Prioritize Actionable Remediation
Products and Releases  |  3/22/2018  | 
Operating as a fully automated purple team, XM Cyber combines red and blue teaming processes to always stay ahead of the hacker
Cofense Malware Review Covers Trends and Predictions on Malware, Delivery Methods and Trending Attacks
Products and Releases  |  3/22/2018  | 
Abuse of legitimate software, rapid exploitation of disclosed vulnerabilities and dynamic phishing techniques increase infection rates, according to the report
Tax Software Providers Not Protecting Emails from Phishing and Spoofing
Products and Releases  |  3/21/2018  | 
Half of Top 8 Tax Software Providers Leave Consumers Vulnerable to Email-Borne Attacks That Can Lead to Identity and Bank Account Theft Customers of H&R Block, TaxAct, Turbo Tax and Free Tax USA Most Susceptible
Kaspersky Lab finds Prilex POS malware evolving to target chip and PIN-protected cards
Products and Releases  |  3/20/2018  | 
The group behind the Prilex point-of-sale (POS) malware can now turn stolen credit card data into functional plastic cards according to the latest research from Kaspersky Labs.
UpGuard Launches Breachsight Breach Discovery Engine
Products and Releases  |  3/20/2018  | 
Cyber risk company unveils solution to locate, analyze, and remediate data exposures
PCI SSC Announces Changes to Qualified Integrators and Resellers Program
Products and Releases  |  3/14/2018  | 
The changes are designed to improve payment data security and reduce merchants' risk.
The Industrial Internet Consortium Releases the Endpoint Security Best Practices White Paper
Products and Releases  |  3/12/2018  | 
Simplifies Guidance for Improving IIoT Endpoint Security
Cyberattacks Get Pricy: Growing Companies Turn to Outsourced Solutions
Products and Releases  |  3/7/2018  | 
Arctic Wolf Networks Selected by Trusource Labs for SOC-as-a-Service.
Bandura Systems Closes $3.5 Million Seed Round
Products and Releases  |  3/7/2018  | 
Company that pioneered Threat Intelligence Gateways for US government expands executive team, announces dual headquarters
Netskope Expands Commitment to Enterprise Security with New Office of the CSO
Products and Releases  |  3/1/2018  | 
Industry veteran Jason Clark joins company to lead new team
Intersections Inc. Launches Data Breach Readiness Program for Small and Medium Sized Businesses
Products and Releases  |  3/1/2018  | 
Specifically designed to help manage cyber threats and prepare businesses for data breach
KnowBe4 Issues 2018 Threat Impact and Endpoint Protection Report
Products and Releases  |  3/1/2018  | 
Midmarket and Enterprise Organizations Are the Hardest Hit with Ransomware and External Malware
Bugcrowd Secures $26 Million
Products and Releases  |  3/1/2018  | 


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17366
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
CVE-2020-9036
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
CVE-2020-15127
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
CVE-2020-15132
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
CVE-2020-7298
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.