Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2016
US PC Users Making Some Progress in Patching Software Vulnerabilities, But Significant Challenges Remain
Products and Releases  |  4/29/2016  | 
Private Microsoft Windows users patching their operating systems more diligently but the same cannot be said of Apple QuickTime and Oracle Java users.
Threat Stack Secures $15.3 Million in Series B Funding to Drive More Efficiency for Cloud Security Teams
Products and Releases  |  4/29/2016  | 
Scale Venture Partners Leads Round; Market Demand and Rapid Customer Growth Key to Series B Funding Round
Bitglass Report: BYOD Supported in More Than 70 Percent of Organizations That Are Driven by Need for Increased Productivity
Products and Releases  |  4/29/2016  | 
Financial Services Industry Leads in Support for BYOD, Despite Regulations and Security Concerns
VASCO Launches FIDO U2F Certified Authenticator for Use with Popular Online Applications
Products and Releases  |  4/20/2016  | 
DIGIPASS SecureClick one-button authenticator allows users to easily add the enhanced security of two-factor authentication to common applications
Symantec Partners with Rockwell Automation to Maximize Security for Industrial PCs
Products and Releases  |  4/20/2016  | 
Symantec Embedded Security: Critical Systems Protection has been qualified for use with Rockwell Automation software
TrapX Security Expands: Fueled by Customer Demand and Additional $5 Million Investment from Strategic Cyber Ventures LLC
Products and Releases  |  4/19/2016  | 
In Addition to Triple Digit Worldwide Growth, the Company Appointed Three New Vice Presidents to Further Expand the Companys Product Portfolio and Increase Worldwide Sales
Bastille Report Finds More Than 80 Percent of Businesses are Potentially Vulnerable to Being MouseJacked
Products and Releases  |  4/19/2016  | 
Results Suggest That Despite Increased Awareness and Concern, Some Companies and Individuals Continue to Ignore Risks of the MouseJack Threat
LANDESK Closes 7th Acquisition in 5 Years
Products and Releases  |  4/19/2016  | 
Finalizes AppSense Acquisition, Advances Lead in Unified Endpoint Management with Extended User Virtualization Capabilities
ISACAs New Cybersecurity Boot Camp Coming to New York
Products and Releases  |  4/19/2016  | 
Intensive five-day training helps organizations develop their cyber workforces
Former NSC Director of Cybersecurity Policy Leads Illumio Cyber Assessment Program
Products and Releases  |  4/18/2016  | 
Program Designed to Identify Attack Surface and Secure High-Value Assets Inside Data Centers and Clouds
Lets Encrypt Leaves Beta
Products and Releases  |  4/14/2016  | 
New and renewing sponsors back Lets Encrypt technology and its mission to encrypt 100 percent of the Web
DHS, NASA PARTNER IN SEARCH OF INNOVATION IN HOMELAND SECURITY
Products and Releases  |  4/13/2016  | 
Developing Prize Competitions to Engage Citizen Scientists in Public and Private Sectors
TECHNICAL EXPERTS AT BAE SYSTEMS REVEAL DETAILS OF NEW STRAIN OF VIRULENT CYBER THREAT
Products and Releases  |  4/12/2016  | 
Cyber criminals targeting public institutions with modified form of Qbot malware
Optiv Security Expands Identity and Access Management with Close of Advancive Acquisition
Products and Releases  |  4/12/2016  | 
Transaction Brings Together Two Respected IAM Organizations to Solve Client Identity Problems in New and Innovative Ways
KnowBe4 Unveils Kevin Mitnick Security Awareness Training Spring 2016
Products and Releases  |  4/11/2016  | 
KnowBe4 adds first human pentest, USB drive test, and geo-location to simulated phishing testing.
Lookout Welcomes Bluebox Security
Products and Releases  |  4/8/2016  | 
Unsecured Vendor Access Creates the Perfect Storm for Cyber Attacks
Products and Releases  |  4/8/2016  | 
Groundbreaking Vendor Vulnerability study finds an increasing trust and dependence on third-party vendors with access to IT systems is opening organizations up to cyber-security breaches
CodeMeter Named CODiE Awards Finalist
Products and Releases  |  4/8/2016  | 
CodeMeter Secure Licensing Platform earns prestigious industry recognition


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16632
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
CVE-2021-32073
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.