Products and Releases

Content posted in April 2017
McAfee Showcases Increased Commitment to Cyber Threat Research with Shamoon Revelations
Products and Releases  |  4/26/2017  | 
McAfee Links Series of Shamoon Malware Campaigns Targeting Saudi Arabia; Suggests One Common Actor Behind Attacks.
BICS Enters Definitive Agreement to Acquire TeleSign Corporation
Products and Releases  |  4/25/2017  | 
BICS global network and reach to mobile operators combined with TeleSigns cloud communications platform and state-of-the-art mobile identity & authentication solutions creates the first global end-to-end Communication Platform as a Service (CPaaS).
Lacework Launches with Cloud Workload Security Platform
Products and Releases  |  4/24/2017  | 
Cyberbits Endpoint Detection and Response Advances Adaptive, Automated Cybersecurity Capabilities
Products and Releases  |  4/24/2017  | 
Cyberbit EDR uses adaptive behavioral analysis to detect file-less, signature-less attacks
Guidance Software Announces Forensic Security Research Program
Products and Releases  |  4/20/2017  | 
Thousands of dollars in prize money is available for original forensic artifacts.
Venafi Announces New Cloud Security Service for DevOps Teams
Products and Releases  |  4/18/2017  | 
Security leader offers fast, no-cost friction-less certificates
CyberGRX Closes $20M Series B Funding to Accelerate Growth of Worlds First Third-Party Cyber Risk Exchange
Products and Releases  |  4/18/2017  | 
Bessemer Venture Partners Leads Series B Round with Participation from Existing Investors; Funding Comes on Heels of Launch of CyberGRX Exchange
Kaspersky Lab Extends Bug Bounty Program
Products and Releases  |  4/17/2017  | 
Rapid7 Defines Next-Generation Analytics Platform for Security and IT Professionals
Products and Releases  |  4/12/2017  | 
New virtual machine vulnerability management and beta for cloud-powered app security testing
CA Technologies Completes Acquisition of Veracode
Products and Releases  |  4/3/2017  | 


Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-2765
PUBLISHED: 2018-08-20
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks.
CVE-2018-15594
PUBLISHED: 2018-08-20
arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
CVE-2018-15572
PUBLISHED: 2018-08-20
The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
CVE-2018-15573
PUBLISHED: 2018-08-20
** DISPUTED ** An issue was discovered in Reprise License Manager (RLM) through 12.2BL2. Attackers can use the web interface to read and write data to any file on disk (as long as rlm.exe has access to it) via /goform/edit_lf_process with file content in the lfdata parameter and a pathname in the lf...
CVE-2018-15574
PUBLISHED: 2018-08-20
** DISPUTED ** An issue was discovered in the license editor in Reprise License Manager (RLM) through 12.2BL2. It is a cross-site scripting vulnerability in the /goform/edit_lf_get_data lf parameter via GET or POST. NOTE: the vendor has stated "We do not consider this a vulnerability."