Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2019
ESET Partners with Alphabet's Chronicle
Products and Releases  |  4/26/2019  | 
Device as Online Passport; TransUnions iovation Launches Updated Products
Products and Releases  |  4/9/2019  | 
Provides new ways to stop fraud without inconveniencing good customers
Global Insurer Addresses Cybersecurity Threats with Breach Protection Platform
Products and Releases  |  4/9/2019  | 
Continuous innovation to stay at eye level with attackers using holistic security platform.
Cynet Announces Free Cybersecurity Threat Assessment for Midsize and Large Organizations
Products and Releases  |  4/5/2019  | 
Cynet Threat Assessment program spotlights critical, exposed attack surfaces.
iovation Releases New Product Features
Products and Releases  |  4/5/2019  | 
Series of updates to online fraud prevention and authentication products increase security for businesses and reduce friction for consumers.
Aqua Security Closes $62M in Funding
Products and Releases  |  4/3/2019  | 
Led by Insight Partners, the investment round will enable Aqua to expand its platform.
Global Incident Response Threat Report (GIRTR) from Carbon Black Details Notable Rise in Island Hopping and Counter Incident Response (IR) Behaviors
Products and Releases  |  4/2/2019  | 
Survey finds attackers fighting back against security teams while also targeting supply chains With one of the most robust IR communities in cybersecurity, Carbon Black partners conduct more than one response engagement per day, on average, using Carbon Black software
Cybercriminals Using Popular TV Shows to Spread Malware
Products and Releases  |  4/1/2019  | 
Illegally streamed episodes of Game of Thrones, The Walking Dead, and Arrow used by cybercriminals to deploy malicious files.
Security Approach Prevents Data Theft By Imposing Limits on Data Travel, Preventing Unauthorized Access to High Value Servers
Products and Releases  |  4/1/2019  | 
HopSphere Radius Security Applies Standard Routing Principles to Put Data on a Leash, restricting critical data from going to dangerous or untrusted destinations


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16632
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
CVE-2021-32073
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.