Products and Releases

Content posted in April 2016
US PC Users Making Some Progress in Patching Software Vulnerabilities, But Significant Challenges Remain
Products and Releases  |  4/29/2016  | 
Private Microsoft Windows users patching their operating systems more diligently but the same cannot be said of Apple QuickTime and Oracle Java users.
Threat Stack Secures $15.3 Million in Series B Funding to Drive More Efficiency for Cloud Security Teams
Products and Releases  |  4/29/2016  | 
Scale Venture Partners Leads Round; Market Demand and Rapid Customer Growth Key to Series B Funding Round
Bitglass Report: BYOD Supported in More Than 70 Percent of Organizations That Are Driven by Need for Increased Productivity
Products and Releases  |  4/29/2016  | 
Financial Services Industry Leads in Support for BYOD, Despite Regulations and Security Concerns
VASCO Launches FIDO U2F Certified Authenticator for Use with Popular Online Applications
Products and Releases  |  4/20/2016  | 
DIGIPASS SecureClick one-button authenticator allows users to easily add the enhanced security of two-factor authentication to common applications
Symantec Partners with Rockwell Automation to Maximize Security for Industrial PCs
Products and Releases  |  4/20/2016  | 
Symantec Embedded Security: Critical Systems Protection has been qualified for use with Rockwell Automation software
TrapX Security Expands: Fueled by Customer Demand and Additional $5 Million Investment from Strategic Cyber Ventures LLC
Products and Releases  |  4/19/2016  | 
In Addition to Triple Digit Worldwide Growth, the Company Appointed Three New Vice Presidents to Further Expand the Companys Product Portfolio and Increase Worldwide Sales
Bastille Report Finds More Than 80 Percent of Businesses are Potentially Vulnerable to Being MouseJacked
Products and Releases  |  4/19/2016  | 
Results Suggest That Despite Increased Awareness and Concern, Some Companies and Individuals Continue to Ignore Risks of the MouseJack Threat
LANDESK Closes 7th Acquisition in 5 Years
Products and Releases  |  4/19/2016  | 
Finalizes AppSense Acquisition, Advances Lead in Unified Endpoint Management with Extended User Virtualization Capabilities
ISACAs New Cybersecurity Boot Camp Coming to New York
Products and Releases  |  4/19/2016  | 
Intensive five-day training helps organizations develop their cyber workforces
Former NSC Director of Cybersecurity Policy Leads Illumio Cyber Assessment Program
Products and Releases  |  4/18/2016  | 
Program Designed to Identify Attack Surface and Secure High-Value Assets Inside Data Centers and Clouds
Lets Encrypt Leaves Beta
Products and Releases  |  4/14/2016  | 
New and renewing sponsors back Lets Encrypt technology and its mission to encrypt 100 percent of the Web
DHS, NASA PARTNER IN SEARCH OF INNOVATION IN HOMELAND SECURITY
Products and Releases  |  4/13/2016  | 
Developing Prize Competitions to Engage Citizen Scientists in Public and Private Sectors
TECHNICAL EXPERTS AT BAE SYSTEMS REVEAL DETAILS OF NEW STRAIN OF VIRULENT CYBER THREAT
Products and Releases  |  4/12/2016  | 
Cyber criminals targeting public institutions with modified form of Qbot malware
Optiv Security Expands Identity and Access Management with Close of Advancive Acquisition
Products and Releases  |  4/12/2016  | 
Transaction Brings Together Two Respected IAM Organizations to Solve Client Identity Problems in New and Innovative Ways
KnowBe4 Unveils Kevin Mitnick Security Awareness Training Spring 2016
Products and Releases  |  4/11/2016  | 
KnowBe4 adds first human pentest, USB drive test, and geo-location to simulated phishing testing.
Lookout Welcomes Bluebox Security
Products and Releases  |  4/8/2016  | 
Unsecured Vendor Access Creates the Perfect Storm for Cyber Attacks
Products and Releases  |  4/8/2016  | 
Groundbreaking Vendor Vulnerability study finds an increasing trust and dependence on third-party vendors with access to IT systems is opening organizations up to cyber-security breaches
CodeMeter Named CODiE Awards Finalist
Products and Releases  |  4/8/2016  | 
CodeMeter Secure Licensing Platform earns prestigious industry recognition


13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.