Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in May 2015
New ISACA Events Serve Women in Security
Products and Releases  |  5/29/2015  | 
Free Webinar in June and CSX 2015 in October
New Survey Shows Lack of Confidence in Organizations' Cyber Security
Products and Releases  |  5/29/2015  | 
New Lieberman Software survey reveals that todays complicated IT security solutions are not being properly deployed and, for most organizations, compliance trumps security
Fortinet Announces Agreement to Acquire Meru Networks
Products and Releases  |  5/28/2015  | 
Acquisition Expected to Bolster Fortinets Secure Wireless Solutions, Add Enterprise Customers, and Expand Total Addressable Market
Imperva Unveils New Cloud Architecture to Maximize Protection of Data and Applications
Products and Releases  |  5/28/2015  | 
Imperva Skyfence, Provisioned on Imperva Incapsula, Provides Superior Levels of Security, Performance and Availability
Check Point Delivers SCADA Security Solutions to Protect Industrial Control Systems against Cyber Threats
Products and Releases  |  5/26/2015  | 
New hardened security appliance with most in depth SCADA security for your Critical Infrastructure
Promisec Brings a New Weapon to Combat Cyber Attackers with Release of Promisec Endpoint Manager 4.11
Products and Releases  |  5/26/2015  | 
Combining File Integrity Monitoring and File Reputation Scoring, PEM 4.11 provides Endpoint Detection and Remediation (EDR) of Advanced Threats at Enterprise scale
Fortinet Signs Collaborative Research and Development Agreement with U.S. Department of Homeland Security
Products and Releases  |  5/26/2015  | 
Sharing of Real-Time Security Data to Strengthen Threat Intelligence for Fortinet Customers Globally
Fox-IT Launches Web and Mobile Event Analytics Platform for U.S. Financial Services Industry
Products and Releases  |  5/26/2015  | 
Company will demonstrate DetACT at the 2015 FS-ISAC and BITS Annual Summit solution showcase
Delphix Acquires Data Masking Leader, Axis Technology Software
Products and Releases  |  5/22/2015  | 
Acquisition Adds Integrated Masking to Data as a Service Platform
Logentries Launches Low-Cost Security Information and Event Management (SIEM) Service for Easy, Real-time Security Analysis
Products and Releases  |  5/22/2015  | 
Industry-standard SIEM Service Enables Customers to Easily and Cost-effectively Meet Specific Compliance Requirements
MACH37 Cyber Accelerator Accepting Applications for Fall 2015 Session
Products and Releases  |  5/22/2015  | 
Fall 15 Cohort to Begin on September 8th
Veracode Introduces IAST for Enhanced Risk Reduction in DevOps and Agile Environments
Products and Releases  |  5/22/2015  | 
Continues Strategy of Incorporating Complementary Technologies via Open and Extensible Platform
OpenDNS First to Offer Threat Intelligence Cloud Enforcement Through APIs
Products and Releases  |  5/22/2015  | 
Leading Cloud Security Company Makes API Available for Customers To Enable Advanced Enforcement of Security Threats
Research Shows Workers Ignoring Known Cyber Risks, Surfing Adult Content and Downloading Unapproved Apps
Products and Releases  |  5/19/2015  | 
Global Survey Highlights Disconnect Between Employee Awareness of Cyber Threats and Their Actions
Decline in detected malware attacks in organisations coincides perfectly with weekends.
Products and Releases  |  5/15/2015  | 
Good Morning Monday Hello Cyber Attack
SANs Survey Reveals Organizations Lack Control Over Mobile Workspaces
Products and Releases  |  5/14/2015  | 
More than 64 Percent of Mobile Workers Can Access High Value Data Remotely while One in Three Devices Are Unmanaged
CoroNet Launches Solution to Protect from Eavesdropping, Data Interception and Remote Manipulation of Devices on WiFi and Cellular Networks
Products and Releases  |  5/13/2015  | 
CoroNets Enterprise Offering Helps Carriers, MSSPs and Device Manufacturers to Protect their Customers from the Fastest-Growing Cyber Threat
Digital Guardian Acquires Savant Protection
Products and Releases  |  5/13/2015  | 
Acquisition extends the Digital Guardian Data Aware Endpoint Security Platform to fixed-function devices
Absolute Survey Shows Millennials Represent Greatest Risk to Corporate Data
Products and Releases  |  5/13/2015  | 
Absolute Software Report Uncovers Usage Behavior and Security Risks of Connected Employees
Bitdefender Rolls Out New Technology for Virtualized Infrastructure Security
Products and Releases  |  5/13/2015  | 
Bitdefender defeats long-exploited advanced threat vectors in virtualized environments
Bracket Computing Announces High-Assurance Security Capabilities for Hyperscale Clouds
Products and Releases  |  5/13/2015  | 
Bracket Security Fabric Allows Large Enterprises to Move Their Most Sensitive Workloads to the Public Cloud with Confidence
LiveEnsure Launches FourSure, a Peer-to-Peer Trust App
Products and Releases  |  5/13/2015  | 
The FourSure mobile app enables peer users to authenticate each other and protect their shared content across any social or storage network
High-Tech Bridge launches web penetration test security seal
Products and Releases  |  5/12/2015  | 
New security seal gives consumers confidence that websites have been manually tested for most complex vulnerabilities in accordance to industry standards and best-practices
Bracket Computing Announces New High-Assurance Security Capabilities for Hyperscale Clouds
Products and Releases  |  5/12/2015  | 
Bracket Security Fabric Allows Large Enterprises to Move Their Most Sensitive Workloads to the Public Cloud
Survey: Most IT Pros Dont Know Where Sensitive Company Data Resides
Products and Releases  |  5/12/2015  | 
Survey Results from RSA Conference Indicate Securing the Cloud Continues to be a Work in Progress
Enterprise IT Heads Indicate Need for Scalable, Secure Mobile App Platforms
Products and Releases  |  5/11/2015  | 
New moBack Study Finds More Than Half of Enterprises Developing Mobile and Web Applications Cite Biggest Challenge as High Costs Associated with DevOps and Infrastructure Provisioning
Free App Shows Unencrypted Data
Products and Releases  |  5/11/2015  | 
App From UNH Helps You Find Unencrypted Data Leaked From Applications on Your Phone and Computer
Online ad industry fires back against $6.3 billion fraud issue
Products and Releases  |  5/11/2015  | 
TAG Fraud Threat List Identifies Known Sources of Bot Traffic; Pilot Program Underway with Broader Deployment Expected in Q3 2015
Twistlock Unveils Virtual Container Security Suite to Keep Container-Based Apps Secure
Products and Releases  |  5/7/2015  | 
Emerging from Stealth Mode, the Company Announces $2.5 Million Funding from YL Ventures
BakerHostetler Data Security Incident Response Report Shows Human Error is More Often to Blame
Products and Releases  |  5/7/2015  | 
Findings highlight employee negligence as primary factor in majority of cases; No industry is immune; Enhanced detection capabilities critical
Troux Introduces Solutions to Combat Cybersecurity Risk
Products and Releases  |  5/7/2015  | 
Technology Lifecycle Management Shores Up Most Common Opening for Cyber Criminals
Swivel Secure Launches OneTouch Authentication
Products and Releases  |  5/7/2015  | 
Mobile app-based deployment option offers increased speed for authentication
Cybereason Closes $25 Million Series B Funding Round, Enters Strategic Partnership with Lockheed Martin
Products and Releases  |  5/6/2015  | 
Spark Capital and Lockheed Martin Join CRV; Lockheed Martin to Deploy the Cybereason Platform Across 120,000 Internal Endpoints, Integrates it into its Cyber Solution Portfolio
Browser Malware, Operational Burdens Driving Enterprises to Seek Effective Technology for Secure Web Access
Products and Releases  |  5/6/2015  | 
In New ESG Study, IT Professionals Cite Escalating Security Vulnerabilities and Operational Issues; Say Securing the Browser is an Administrative Nightmare.
Visa Launches Online Toolkit to Educate Business Owners on Benefits of Chip Technology
Products and Releases  |  5/6/2015  | 
This new resource provides tips and training for merchants seeking a seamless transition to chip-enabled card readers
Kaspersky Lab Reports Malicious Attack Increase in Q1 IT Threat Evolution Report
Products and Releases  |  5/6/2015  | 
The Company Reflects on Monumental Cyber Threat Discoveries Reported During the Quarter
NH-ISAC, THE NATIONAL HEALTH ISAC, SELECTS SOLTRA EDGE TO STANDARDIZE THREAT INTELLIGENCE PLATFORM
Products and Releases  |  5/6/2015  | 
Becomes The Second ISAC to Leverage the Solution to Strengthen Cyber Threat Intelligence Capabilities with Soltra
Issuers Forecast U.S. Shift to Chip Cards To Be Nearly Complete by 2017
Products and Releases  |  5/4/2015  | 
New Payments Security Task Force Survey Notes Accelerated Move Toward More Secure Technology
Facebook Adopts RiskIQ To Stop Malvertising
Products and Releases  |  5/4/2015  | 
Protects More than One Billion Users from Malicious Ads


Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16966
PUBLISHED: 2019-10-21
An issue was discovered in Contactmanager 13.x before 13.0.45.3, 14.x before 14.0.5.12, and 15.x before 15.0.8.21 for FreePBX 14.0.10.3. In the Contactmanager class (html\admin\modules\contactmanager\Contactmanager.class.php), an unsanitized group variable coming from the URL is reflected in HTML on...
CVE-2019-9491
PUBLISHED: 2019-10-21
Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed.
CVE-2019-16964
PUBLISHED: 2019-10-21
app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any comma...
CVE-2019-16965
PUBLISHED: 2019-10-21
resources/cmd.php in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute any commands on the host as www-data.
CVE-2019-18203
PUBLISHED: 2019-10-21
On the RICOH MP 501 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn and KeyDisplay parameter to /web/entry/en/address/adrsSetUserWizard.cgi.