Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2020
Kaspersky Announces Integrated Endpoint Security
Products and Releases  |  6/30/2020  | 
New product aimed at midsize and enterprise-size business.
IBM Study: Security Response Planning on the Rise, But Containing Attacks Remains an Issue
Products and Releases  |  6/30/2020  | 
Global Survey Finds More Security Tools Lead to Less-Effective Security Response Most Organizations Dont Have Specific Plans for Common and Emerging Attacks
Abnormal Security Data Reveals 200% Monthly Increase in BEC Attacks Focused on Invoice or Payment Fraud
Products and Releases  |  6/30/2020  | 
Company also notes a 36% increase in the number of organizations experiencing these attacks.
Cynet Announces $18M Funding Round
Products and Releases  |  6/29/2020  | 
The Telekom Innovation Pool (TIP), Deutsche Telekom's strategic investment fund advised by DTCP, announces its investment in Cynet.
Authomize Secures $6M Seed Funding for Automated Authorization and Security
Products and Releases  |  6/24/2020  | 
Authomize emerges from stealth to unveil its automated authorization governance and management solution.
WatchGuard Technologies Report Finds Two-Thirds of Malware is Encrypted, Invisible Without HTTPS Inspection
Products and Releases  |  6/24/2020  | 
Q1 2020 Internet Security Report highlights the danger of encrypted malware, offers details about the security impact of the COVID-19 pandemic, as well as a surge in Monero cryptominers, Flawed-Ammyy and Cryxos malware, and more.
Blueliv and King & Union Announce Threat Intelligence Partnership
Products and Releases  |  6/23/2020  | 
US-based cyber vendor harnesses Blueliv threat intelligence for its Avalon Cyber Analysis Platform and new suite of Culper Group services.
RangeForce Debuts New Cyberskills Platform
Products and Releases  |  6/23/2020  | 
Enterprises can operationalize cybersecurity training with easily deployed prescriptive learning paths for all levels of security, IT and DevOps roles.
Armorblox Announces Box and Slack Integrations to Protect Remote Workforces Across Communication Platforms
Products and Releases  |  6/18/2020  | 
API-Based Integrations with Box and Slack Extends Armorblox Protection Beyond Email to Stop Socially Engineered Attacks, Sensitive Data Disclosures, and Lateral Data Loss
Small Businesses Continue to Underestimate Cyberthreats Even as More Work Remotely
Products and Releases  |  6/17/2020  | 
A significant gap between the perceived importance of cybersecurity protections for businesses with fewer than 10 employees and those with more than 10 employees.
Attivo Networks Improves Endpoint Security as Demonstrated by MITRE ATT&CK Evaluations
Products and Releases  |  6/17/2020  | 
When used in conjunction with leading EDR solutions, Attivo EDN technology augments the detection rates by an average of 42%.
Salt Security Closes $20 Million Series A Funding Round Led by Tenaya Capital
Products and Releases  |  6/16/2020  | 
Company's API Protection Platform revolutionizes application security in the age of Digital Transformation.
Digital Shadows Announces New Capabilities to Identify & Remediate Unwanted Code Exposure
Products and Releases  |  6/16/2020  | 
"Unauthorized commit" alerts designed to manage key risk factor behind 60%[1] of public cloud data breaches
60% of Organizations Expect to Suffer from an Email-borne Attack: Mimecast Report
Products and Releases  |  6/11/2020  | 
"State of Email Security 2020" finds greatest new concern is email and web ppoofing.
Cybersecurity SaaS Company Axio Closes Funding Round
Products and Releases  |  6/11/2020  | 
Startup plans to accelerate platform innovation and expand offerings into the financial sector.
All Mobile Networks Vulnerable to DoS, Impersonation & Fraud Cyberattacks Through GTP Protocol
Products and Releases  |  6/10/2020  | 
Vulnerabilities affect non-standalone 5G networks, putting industrial equipment, smart homes, and city infrastructure at risk.
Sophos Advances Endpoint Detection and Response (EDR)
Products and Releases  |  6/9/2020  | 
New Version of Sophos' EDR Provides Industry's First Solution Designed for Security Analysts and IT Administrators Now with Live Discover and Response Capabilities
HelpSystems Expands Native Virus Protection Software to Include LinuxONE and IBM Z
Products and Releases  |  6/8/2020  | 
Powertech Antivirus offers server-level virus and malware protection.
Bishop Fox, Illumio Share Microsegmentation Research Findings
Products and Releases  |  6/8/2020  | 
Project finds a 300% increase in attacker difficulty with even simple microsegmentation.
RedSeal Appoints Bryan Barney as New CEO
Products and Releases  |  6/2/2020  | 
Barney will drive continued development of the RedSeal platform and its commercial adoption by government agencies and Global 2000 companies.
Armor Upgrades Armor Anywhere Threat Detection and Response Technology
Products and Releases  |  6/2/2020  | 
New features include the flexibility to turn security capabilities on and off, and easily ingest log data from other sources.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/13/2020
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15256
PUBLISHED: 2020-10-19
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and settin...
CVE-2020-15261
PUBLISHED: 2020-10-19
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administr...
CVE-2020-6084
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
CVE-2020-6085
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
CVE-2020-10746
PUBLISHED: 2020-10-19
A flaw was found in Infinispan version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server.