Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2018
Bugcrowd Brings Vulnerability Remediation to Crowdsourced Security Market
Products and Releases  |  6/29/2018  | 
Vulnerability remediation advice is intended to help customers fix vulnerabilities and write more secure code.
Report: Malicious Cryptocurrency Miners Gaining Momentum, Poised for Continued Growth
Products and Releases  |  6/29/2018  | 
WatchGuards Q1 2018 Internet Security Report reveals a rise in crypto-miner attacks and several geographically targeted malware campaigns.
Security Visionary Balbix Expands Its Go-to-Market Strategy through Series B Funding and New Senior Board Members and Executives
Products and Releases  |  6/28/2018  | 
New investors include Singtel Innov8, Mubadala and John Chambers/JC2 Ventures; new board members include experienced industry leaders
JASK Announces $25M Series B Financing Led by Kleiner Perkins
Products and Releases  |  6/28/2018  | 
Investment Will Accelerate Adoption of the JASK Autonomous Security Operations Center Platform; Kleiner Perkins Ted Schlein to Join Board
Cynet Raises $13M to Fuel Growth
Products and Releases  |  6/28/2018  | 
Silverfort Raises $11.5 Million in Series A for Next Generation Multi-Factor Authentication
Products and Releases  |  6/26/2018  | 
Silverforts authentication platform delivers adaptive multi-factor authentication across entire enterprise networks and cloud environments without any modifications to endpoints and servers
Considering Blockchain? Security Innovation Research Suggests Organizations Still in Learning Mode
Products and Releases  |  6/26/2018  | 
The company's blockchain training and assessments help organizations determine if its right for them and how to securely implement it.
Agari Announces $40M Growth Round to Accelerate Cloud Email Security Platform
Products and Releases  |  6/25/2018  | 
Significant investment led by Goldman Sachs affirms AI-based strategy to stop advanced phishing and identity deception attacks
Bugcrowd announces partnership with Upwork to enhance security for the largest freelancing site
Products and Releases  |  6/25/2018  | 
Upwork takes bug bounty program public, offering up to $5,000 for each vulnerability discovered in its marketplace
Wedge Networks Increases Functionality, Performance of Malware Prevention Platform
Products and Releases  |  6/25/2018  | 
Release 2.0 of the Wedge Advanced Malware Blocker introduces support for Avira anti-malware technology and scanning of internal traffic to maximize threat prevention.
Vade Secure Launches Native, AI-Based Email Security Add-On for Office 365
Products and Releases  |  6/25/2018  | 
Solution designed to protect against phishing, spearphishing and malware; provides Microsoft partners with a solution for Office 365 clients.
Bomgar Releases Free Privileged Account Discovery Tool
Products and Releases  |  6/24/2018  | 
Winners Announced for US Cyber Challenge Competition
Products and Releases  |  6/22/2018  | 
Top Cyber Talent Competes at Virginia Tech
Trillium Opens Michigan Cybersecurity Operations and R&D Center
Products and Releases  |  6/21/2018  | 
Trillium Secure announced the establishment of an operations and R&D center in Ann Arbor, Michigan.
Avira Launches Free Security Tool for Mac
Products and Releases  |  6/21/2018  | 
New Report Shows Fraud on the Rise with Sharp Growth in US-Based Activity
Products and Releases  |  6/21/2018  | 
DataVisor reports 900 million malicious activities and transactions in Q1 2018.
Duo Security's Trusted Endpoints Integrated with Sophos Mobile
Products and Releases  |  6/20/2018  | 
Duo Beyonds Trusted Endpoints integrated with Sophos Mobile enables granular access management policies for enhanced BYOD security.
FireEye and Gigamon Announce Global Partnership
Products and Releases  |  6/20/2018  | 
Strategic alliance combines next generation network packet broker capabilities with sophisticated threat management to bring greater protection and resilience to customer security infrastructures
Cylance Announces $120 Million Funding Round
Products and Releases  |  6/19/2018  | 
Paladin Cyber Introduces Paladin Browser Protection as Google Chrome Extension
Products and Releases  |  6/14/2018  | 
Free extension keeps hackers out of consumers browsers and inboxes to protect private information.
US Cyber Challenge Kicks Off 2018 Camp Season at Virginia Tech
Products and Releases  |  6/12/2018  | 
Aspiring cybersecurity talent will participate in competitions and intensive training.
Pulse Secure Virtual Application Delivery Controller Extends Availability to AWS GovCloud (US)
Products and Releases  |  6/12/2018  | 
Pulse Secure supports automation and integration with DevOps tools on Amazon Web Services GovCloud (US) Region.
Symantec Introduces Cloud-Based Network Security Solution with Web Isolation; adds Complete Endpoint Protection
Products and Releases  |  6/7/2018  | 
Network Security for the Cloud Generation delivers comprehensive, cloud-based protection from network to endpoint to reduce risk and protect enterprises as businesses move to the cloud
Corelight Expands Product Portfolio with New Network Visibility Sensors
Products and Releases  |  6/5/2018  | 
New models cover any site from branch offices to large data centers; the company also releases software to improve manageability and threat intelligence capabilities.


Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17513
PUBLISHED: 2019-10-18
An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
CVE-2019-8216
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8217
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8218
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8219
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .