Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2014
Ohanae Introduces Cloud Privacy Protection Suite
Products and Releases  |  6/30/2014  | 
Patent pending technology ensures passwords and encryption keys are dynamically created, never stored
Blackphone Shipping World’s First Privacy-Optimized Smartphone
Products and Releases  |  6/30/2014  | 
Handsets now shipping to customers; Web store re-opens July 14 for new orders.
Dimension Data Unveils 2014 Network Barometer Report
Products and Releases  |  6/26/2014  | 
Annual report reveals the percentage of aging and obsolete devices on corporate networks globally is at its highest in six years.
Akamai Releases First Quarter 2014 ‘State of the Internet’ Report
Products and Releases  |  6/26/2014  | 
DDoS attacks decrease by 20% quarter-over-quarter, but rise 27% year-over-year
Juniper Enhances Next-Generation Firewall
Products and Releases  |  6/25/2014  | 
Enhancements to Juniper Networks(R) SRX Series Services Gateways Offer Enterprises Added Security and Control While Providing Greater Efficiency and Flexibility
Sookasa Introduces Industry’s First Compliant Cloud Document Sharing through any Email Application with no Receiver Setup Required
Products and Releases  |  6/25/2014  | 
Sookasa Launches Industry’s First Solution for Sharing Files Encrypted on Public Cloud Services Using Secure File Links; Adds Support for Dropbox Encryption on Android Devices for BYOD Initiatives.
Dominican National Admits Role In $65 Million Stolen Identity Income Tax Refund Fraud Scheme
Products and Releases  |  6/25/2014  | 
More than 8,000 fraudulent U.S. income tax returns to be filed, which sought more than $65 million in tax refunds.
ISA Praises DHS For Progress On Assessing NIST And Promoting Incentives
Products and Releases  |  6/25/2014  | 
Thumbs up to Obama administration for forgoing new regulations for cyber security.
BeyondTrust Offers Free App for Mobile Vuln Management
Products and Releases  |  6/25/2014  | 
New version of Retina CS for Mobile features automated, cloud-based vulnerability signature updates for Android devices
Agiliance NIST Cybersecurity Content Pack Lowers Breach Risk
Products and Releases  |  6/25/2014  | 
Packaged Intelligence in RiskVision Platform Automates Organizational Assessments and Continuous Management of Cyber Security Risks
CyberSponse, Inc. Announces CyberSponse IR360° -- Tier 4-Compliant Cybersecurity Incident Response Platform
Products and Releases  |  6/24/2014  | 
Workflow automation, command and control gives corporate incident response teams the power to manage risk, protect valuable assets, and reduce costs & risk associated with enterprise security operations
Economic espionage reckless threat to global economy not just individual states, says CIGI report
Products and Releases  |  6/24/2014  | 
Centre for International Governance Innovation (CIGI)report released.
Zix Encryption Network Protects Every Email between Its Members
Products and Releases  |  6/24/2014  | 
Businesses address data security threat in email without impacting workflow for employees or partner organizations
LightCyber announces partnership with Check Point
Products and Releases  |  6/24/2014  | 
LightCyber Magna Expands Its Advanced Breach Detection to Mitigate and Contain Attacks Using Industry-leading Check Point Firewall Software Blade.
Vorstack Automates Security Operations
Products and Releases  |  6/23/2014  | 
Latest Release of Vorstack Automation and Collaboration Platform 3.0 Helps Enterprises Reduce Time & Complexity in Identifying Security Risks
40% of Asian companies report significant economic loss from data breaches
Products and Releases  |  6/23/2014  | 
40% say they have suffered significant economic loss as a result of data breaches
Network Box USA Rolls Out Managed Hosted Email Security Solution
Products and Releases  |  6/23/2014  | 
MSSP Launches The Next Evolution Of Its Cloud Security Platform
Privilege Management Provides Defense Against Land-and-Expand Cyber Attacks
Products and Releases  |  6/23/2014  | 
Lieberman Software Explains How Advanced Persistent Threats (APTs) Are Almost Impossible to Stop, But Damage Can be Limited with Privilege Management and Secure Network Design
A.G. Schneiderman And D.A. Gascón Announce That Google And Microsoft Will Include A Smartphone Kill Switch In Next Operating Systems
Products and Releases  |  6/20/2014  | 
Inaugural Report Also Reveals New Data Showing That Thefts Fell Drastically Following Apple’s Introduction Of A Kill Switch
Center for Internet Security Releases 2013 Annual Report and Outlook for 2014
Products and Releases  |  6/20/2014  | 
The nonprofit organization dedicated to enhancing cyber security announces key successes from 2013 and initiatives for 2014
Bromium Research Reveals Insecurity in Existing Endpoint Protection Deployments
Products and Releases  |  6/19/2014  | 
Survey of 300 information security practitioners highlights challenges securing end users
New Study of Tech Policy Landscape Shows Privacy, Security Most Likely to Drive Consumer Action
Products and Releases  |  6/18/2014  | 
Edelman Berland survey explores issues, actions, attitudes of major technology policy issues being debated inside the Beltway
Intellinx 5.1 Fraud Management Platform Integrates with HADOOP for Improved Cybersecurity
Products and Releases  |  6/18/2014  | 
Fraud Detection Solution Utilizes Big Data to Expose Malware Attacks in Real Time
ThreatTrack Security Rolls Out ThreatSecure
Products and Releases  |  6/17/2014  | 
Venture-backed cybersecurity firm introduces ThreatSecure, a disruptive threat detection and remediation technology, and announces plans to expand into Silicon Valley
Black Lotus Communications Launches New Scrubbing Centers
Products and Releases  |  6/17/2014  | 
New Facilities, Increased DDoS Mitigation Capacity Lead to Enhanced Security Solutions for Global Customers
Voltage Introduces Encryption/Tokenization for Testing/Development
Products and Releases  |  6/13/2014  | 
Industry standards-based, Format-preserving Encryption and Tokenization Ensures Maximum Data Protection
Malwarebytes Anti-Exploit launches to protect businesses and consumers from the growing exploit threat
Products and Releases  |  6/12/2014  | 
New technology uses three layers of defense to prevent exploits targeting everyday applications and defeating security software to conduct cyber-espionage and carry out large-scale data theft.
Bridging The Cybersecurity Talent Gap
Products and Releases  |  6/12/2014  | 
Virtual Career Fair Brings Together Top Cyber Jobseekers & Employers
Waratek Protects Enterprise Java Apps from the Inside Out
Products and Releases  |  6/11/2014  | 
Run-Time Self Protection Provides Visibility, Blocking and Virtual Patching Against Threats at Every Layer of the Application Stack
Exabeam Secures $10 Million in Series A Round From Norwest Venture Partners and Aspect Ventures
Products and Releases  |  6/11/2014  | 
Matthew Howard, Theresia Gouw invest in the future of security analytics, join board of directors
First Data and Trustwave Bring New Level of Data Security to Small and Mid-Sized Businesses
Products and Releases  |  6/11/2014  | 
Companies Partner to Help Businesses Go Beyond PCI DSS Compliance with Stronger, Multi-layer Information Security Solutions Delivered through the Cloud
Diego Navarrete, New Panda Security CEO
Products and Releases  |  6/11/2014  | 
Former director of IBM’s Security Systems Division in Europe takes the helm at Panda.
Most People Have Not Protected Themselves Against Fraud Since Target Breach
Products and Releases  |  6/5/2014  | 
'Shocking Lack of Concern' About Cyber Security Issues, New idRADAR Survey Reports.
RiskIQ Raises $25M to Meet Accelerating Demand for Web and Mobile Risk and Malware Detection Service
Products and Releases  |  6/5/2014  | 
Investors Back Unique Approach Used by Financial Institutions and Internet Companies to Address Digital Assets being used to Attack Customers
1st-of-Its-Kind Study Quantifies Cost of a Cloud Data Breach
Products and Releases  |  6/5/2014  | 
IT Estimates Increased Use of Cloud Services Can Triple the Probability of a $20M Data Breach.
Cloudera Strengthens Hadoop Security With Acquisition of Gazzang
Products and Releases  |  6/3/2014  | 
Combines Apache Sentry and Intel's Project Rhino With Gazzang's Encryption and Key Management to Build the Industry's Most Robust End-to-End Security Offering for Hadoop Environments
PandaLabs Quarterly Report: Q1 2014
Products and Releases  |  6/3/2014  | 
Malware creation breaks all records in the first quarter of 2014, with 160,000 new samples every day


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file