Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2014
Ohanae Introduces Cloud Privacy Protection Suite
Products and Releases  |  6/30/2014  | 
Patent pending technology ensures passwords and encryption keys are dynamically created, never stored
Blackphone Shipping World’s First Privacy-Optimized Smartphone
Products and Releases  |  6/30/2014  | 
Handsets now shipping to customers; Web store re-opens July 14 for new orders.
Dimension Data Unveils 2014 Network Barometer Report
Products and Releases  |  6/26/2014  | 
Annual report reveals the percentage of aging and obsolete devices on corporate networks globally is at its highest in six years.
Akamai Releases First Quarter 2014 ‘State of the Internet’ Report
Products and Releases  |  6/26/2014  | 
DDoS attacks decrease by 20% quarter-over-quarter, but rise 27% year-over-year
Juniper Enhances Next-Generation Firewall
Products and Releases  |  6/25/2014  | 
Enhancements to Juniper Networks(R) SRX Series Services Gateways Offer Enterprises Added Security and Control While Providing Greater Efficiency and Flexibility
Sookasa Introduces Industry’s First Compliant Cloud Document Sharing through any Email Application with no Receiver Setup Required
Products and Releases  |  6/25/2014  | 
Sookasa Launches Industry’s First Solution for Sharing Files Encrypted on Public Cloud Services Using Secure File Links; Adds Support for Dropbox Encryption on Android Devices for BYOD Initiatives.
Dominican National Admits Role In $65 Million Stolen Identity Income Tax Refund Fraud Scheme
Products and Releases  |  6/25/2014  | 
More than 8,000 fraudulent U.S. income tax returns to be filed, which sought more than $65 million in tax refunds.
ISA Praises DHS For Progress On Assessing NIST And Promoting Incentives
Products and Releases  |  6/25/2014  | 
Thumbs up to Obama administration for forgoing new regulations for cyber security.
BeyondTrust Offers Free App for Mobile Vuln Management
Products and Releases  |  6/25/2014  | 
New version of Retina CS for Mobile features automated, cloud-based vulnerability signature updates for Android devices
Agiliance NIST Cybersecurity Content Pack Lowers Breach Risk
Products and Releases  |  6/25/2014  | 
Packaged Intelligence in RiskVision Platform Automates Organizational Assessments and Continuous Management of Cyber Security Risks
CyberSponse, Inc. Announces CyberSponse IR360° -- Tier 4-Compliant Cybersecurity Incident Response Platform
Products and Releases  |  6/24/2014  | 
Workflow automation, command and control gives corporate incident response teams the power to manage risk, protect valuable assets, and reduce costs & risk associated with enterprise security operations
Economic espionage reckless threat to global economy not just individual states, says CIGI report
Products and Releases  |  6/24/2014  | 
Centre for International Governance Innovation (CIGI)report released.
Zix Encryption Network Protects Every Email between Its Members
Products and Releases  |  6/24/2014  | 
Businesses address data security threat in email without impacting workflow for employees or partner organizations
LightCyber announces partnership with Check Point
Products and Releases  |  6/24/2014  | 
LightCyber Magna Expands Its Advanced Breach Detection to Mitigate and Contain Attacks Using Industry-leading Check Point Firewall Software Blade.
Vorstack Automates Security Operations
Products and Releases  |  6/23/2014  | 
Latest Release of Vorstack Automation and Collaboration Platform 3.0 Helps Enterprises Reduce Time & Complexity in Identifying Security Risks
40% of Asian companies report significant economic loss from data breaches
Products and Releases  |  6/23/2014  | 
40% say they have suffered significant economic loss as a result of data breaches
Network Box USA Rolls Out Managed Hosted Email Security Solution
Products and Releases  |  6/23/2014  | 
MSSP Launches The Next Evolution Of Its Cloud Security Platform
Privilege Management Provides Defense Against Land-and-Expand Cyber Attacks
Products and Releases  |  6/23/2014  | 
Lieberman Software Explains How Advanced Persistent Threats (APTs) Are Almost Impossible to Stop, But Damage Can be Limited with Privilege Management and Secure Network Design
A.G. Schneiderman And D.A. Gascón Announce That Google And Microsoft Will Include A Smartphone Kill Switch In Next Operating Systems
Products and Releases  |  6/20/2014  | 
Inaugural Report Also Reveals New Data Showing That Thefts Fell Drastically Following Apple’s Introduction Of A Kill Switch
Center for Internet Security Releases 2013 Annual Report and Outlook for 2014
Products and Releases  |  6/20/2014  | 
The nonprofit organization dedicated to enhancing cyber security announces key successes from 2013 and initiatives for 2014
Bromium Research Reveals Insecurity in Existing Endpoint Protection Deployments
Products and Releases  |  6/19/2014  | 
Survey of 300 information security practitioners highlights challenges securing end users
New Study of Tech Policy Landscape Shows Privacy, Security Most Likely to Drive Consumer Action
Products and Releases  |  6/18/2014  | 
Edelman Berland survey explores issues, actions, attitudes of major technology policy issues being debated inside the Beltway
Intellinx 5.1 Fraud Management Platform Integrates with HADOOP for Improved Cybersecurity
Products and Releases  |  6/18/2014  | 
Fraud Detection Solution Utilizes Big Data to Expose Malware Attacks in Real Time
ThreatTrack Security Rolls Out ThreatSecure
Products and Releases  |  6/17/2014  | 
Venture-backed cybersecurity firm introduces ThreatSecure, a disruptive threat detection and remediation technology, and announces plans to expand into Silicon Valley
Black Lotus Communications Launches New Scrubbing Centers
Products and Releases  |  6/17/2014  | 
New Facilities, Increased DDoS Mitigation Capacity Lead to Enhanced Security Solutions for Global Customers
Voltage Introduces Encryption/Tokenization for Testing/Development
Products and Releases  |  6/13/2014  | 
Industry standards-based, Format-preserving Encryption and Tokenization Ensures Maximum Data Protection
Malwarebytes Anti-Exploit launches to protect businesses and consumers from the growing exploit threat
Products and Releases  |  6/12/2014  | 
New technology uses three layers of defense to prevent exploits targeting everyday applications and defeating security software to conduct cyber-espionage and carry out large-scale data theft.
Bridging The Cybersecurity Talent Gap
Products and Releases  |  6/12/2014  | 
Virtual Career Fair Brings Together Top Cyber Jobseekers & Employers
Waratek Protects Enterprise Java Apps from the Inside Out
Products and Releases  |  6/11/2014  | 
Run-Time Self Protection Provides Visibility, Blocking and Virtual Patching Against Threats at Every Layer of the Application Stack
Exabeam Secures $10 Million in Series A Round From Norwest Venture Partners and Aspect Ventures
Products and Releases  |  6/11/2014  | 
Matthew Howard, Theresia Gouw invest in the future of security analytics, join board of directors
First Data and Trustwave Bring New Level of Data Security to Small and Mid-Sized Businesses
Products and Releases  |  6/11/2014  | 
Companies Partner to Help Businesses Go Beyond PCI DSS Compliance with Stronger, Multi-layer Information Security Solutions Delivered through the Cloud
Diego Navarrete, New Panda Security CEO
Products and Releases  |  6/11/2014  | 
Former director of IBM’s Security Systems Division in Europe takes the helm at Panda.
Most People Have Not Protected Themselves Against Fraud Since Target Breach
Products and Releases  |  6/5/2014  | 
'Shocking Lack of Concern' About Cyber Security Issues, New idRADAR Survey Reports.
RiskIQ Raises $25M to Meet Accelerating Demand for Web and Mobile Risk and Malware Detection Service
Products and Releases  |  6/5/2014  | 
Investors Back Unique Approach Used by Financial Institutions and Internet Companies to Address Digital Assets being used to Attack Customers
1st-of-Its-Kind Study Quantifies Cost of a Cloud Data Breach
Products and Releases  |  6/5/2014  | 
IT Estimates Increased Use of Cloud Services Can Triple the Probability of a $20M Data Breach.
Cloudera Strengthens Hadoop Security With Acquisition of Gazzang
Products and Releases  |  6/3/2014  | 
Combines Apache Sentry and Intel's Project Rhino With Gazzang's Encryption and Key Management to Build the Industry's Most Robust End-to-End Security Offering for Hadoop Environments
PandaLabs Quarterly Report: Q1 2014
Products and Releases  |  6/3/2014  | 
Malware creation breaks all records in the first quarter of 2014, with 160,000 new samples every day


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...