Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in July 2013
Page 1 / 2   >   >>
New Release Of Mocana MAP Showcases Built-In Secure Browser
Products and Releases  |  7/31/2013  | 
MAP helps enterprises meet compliance and audit requirements
Tenable Adds New Passive Vulnerability Scanner (PVS) To Nessus Family
Products and Releases  |  7/31/2013  | 
PVS will be available at the end of August as a standalone product
PhishMe Unveils Phish Reporter At Black Hat USA 2013
Products and Releases  |  7/31/2013  | 
Outlook Add-in aggregates and normalizes user-provided reports of suspicious emails
SnoopWall Warns: Beware Of Android Malware
Products and Releases  |  7/31/2013  | 
Company notes increase in number of malicious apps flooding the market
Symantec Posts Better Than Expected Earnings For Q1 FY14
Products and Releases  |  7/31/2013  | 
GAAP revenue for the fiscal first quarter was $1.71 billion
HALOCK Investigation Finds That 25% Of Sampled Colleges And Universities Are Putting Student And Parent Private Financial Data At Risk
Products and Releases  |  7/30/2013  | 
HALOCK sampled 162 institutions in the United States and found 41 that encouraged scanning and emailing unencrypted documents
NetFlow Logic Launches Cyber Threat Security Suite
Products and Releases  |  7/30/2013  | 
Suite includes real-time threat detection of Botnet Command and Control (C&C) Hosts, APT1, and Malicious Hosts by IP Reputation
ThreatTrack Security To Provide Automated Remediation For APTs And Zero-Day Threats
Products and Releases  |  7/30/2013  | 
The Spyder Initiative addresses lack of automated malware remediation
NSS Labs Unveils New Threat Modeling And Threat Forecasting At Black Hat USA
Products and Releases  |  7/30/2013  | 
Services help customers better understand their risk and distill actionable threat intelligence
ICS-ISAC Announces Corporate Board
Products and Releases  |  7/30/2013  | 
Execs from IBM, Verizon, SAIC, and PwC join board
Sophos Offers Hourly Pricing Model For UTM Via AWS
Products and Releases  |  7/30/2013  | 
Sophos UTM now available via a new hourly billing model
Survey Reveals IT Leaders’ Top BYOD And DaaS Concerns
Products and Releases  |  7/30/2013  | 
Navisite survey reveals that while 80 percent of IT leaders surveyed agree that BYOD is the new normal, only 45 percent have a formal BYOD policy in their place
Network Access Control Evolves Into Endpoint Visibility, Access And Security (EVAS) Market, Says ESG
Products and Releases  |  7/30/2013  | 
ESG projects that as NAC transforms into EVAS it will become even more of a mainstream IT technology
Report: 83% Of Mobile Apps Are Risky
Products and Releases  |  7/30/2013  | 
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps
ThreatConnect Launches Collaborative Threat Intelligence Platform
Products and Releases  |  7/30/2013  | 
ThreatConnect combines threat analysis capabilities with social-sharing technologies to detect advanced cyberthreats
OpenDNS Integrates Predictive Detection Capabilities Into Cloud-Delivered Web Security Platform
Products and Releases  |  7/30/2013  | 
Umbrella Web security platform can identify, prevent, contain, and inform on advanced cyberattacks without the need for a malware sample or attack data
FireHost Report Suggests Commodity Cloud Providers Are Bolstering Botnet Agility
Products and Releases  |  7/30/2013  | 
Q2 2013 sees sharp increase in blended, automated attacks
SSH Communications Security Unveils General Availability Of SSH Risk Assessor Tool
Products and Releases  |  7/30/2013  | 
Free tool provides users with a clear report on risk and compliance exposures in Secure Shell environments
Splunk Showcases Security Intelligence Solutions
Products and Releases  |  7/30/2013  | 
Applications have a wide range of use cases, including investigating incidents, detecting advanced threats and improving security and compliance posture
Honoring Black Hat's Sweet 16, Venafi Report Chronicles 16 Years of Attacks, Offers Advice On Defending Against Advanced Threats
Products and Releases  |  7/26/2013  | 
Chronicled in the report are the different eras of attacks and attackers, with factual examples of attacks and exploits from each period
Anti-Scraping Scanning Tool Reveals Web Site Vulnerabilities To Block Web Scraping Snd Data Mining
Products and Releases  |  7/26/2013  | 
System produces an actionable list of recommendations for Web site owners
RSA Adaptive IAM Goes Mobile With Acquisition Of PassBan
Products and Releases  |  7/25/2013  | 
PassBan is ae developer of mobile and cloud-based multifactor authentication technology
IBM Unveils New Software To Help Organizations Identify And Predict Security Risk
Products and Releases  |  7/25/2013  | 
QRadar Vulnerability Manager helps identify, sort, contextualize, and prioritize network vulnerabilities
China, Ukraine And Saudi Arabia See Record Growth in Malware Threats In 2013, According To NQ Mobile Mid-Year Report
Products and Releases  |  7/25/2013  | 
Fake apps, malicious URLs and SMS scams responsible for majority of the estimated 21 million device infections
NSA's First Annual "Science Of Security Competition"
Products and Releases  |  7/24/2013  | 
Winning paper was written by Dr. Joseph Bonneau, who now works for Google
New Study Shows Enterprises NOT Prepared For Cyberattacks
Products and Releases  |  7/24/2013  | 
Respondents say they have seen an uptick in more sophisticated and targeted malware attacks over the past 24 months
Bit9 Introduces The Bit9 Platform For Mac
Products and Releases  |  7/24/2013  | 
Bit9 for Mac defends enterprises against advanced threats
Reputation.com Acquires Online Platform MySocialCloud
Products and Releases  |  7/24/2013  | 
MySocialCloud is a cloud-based platform that enables users to manage all logins and passwords from a single place
C-Level Executives Lack Confidence In Their Cybersecurity
Products and Releases  |  7/24/2013  | 
Nearly 70 percent of C-level executives are concerned their companies are vulnerable to sophisticated malware attacks, but many not adopting best practices in technology and personnel
Riskive Closes $2.2M Seed Round
Products and Releases  |  7/23/2013  | 
Riskive protects government and enterprise organizations from social cyberthreats
Technical Director Of PandaLabs Re-Elected To AMTSO Board
Products and Releases  |  7/23/2013  | 
Luis Corrons ' thrilled and honored to be re-elected to the AMTSO Board for another three-year term'
Centrify Delivers Advanced Security And Auditing to Mitigate Internal Threats To Cloud And On-Premise Servers
Products and Releases  |  7/23/2013  | 
Centrify Suite 2013 Release 2 leverages existing directory infrastructure
Trend Micro Brings Cloud & Data Center Security To The Midmarket With Enhanced Channel Program
Products and Releases  |  7/23/2013  | 
Updates include improvements to the Deal Registration and Specialization Programs
SailPoint Debuts Enterprise-Grade IAM-As-A-Service Suite
Products and Releases  |  7/23/2013  | 
SailPoint IdentityNow services that will be available this quarter include SSO, access certifications, and password management.
CSA Unveils PRISM Survey Results
Products and Releases  |  7/23/2013  | 
In light of recent revelations about government access to customer information, 56% of non-U.S. residents are now less likely to use U.S.-based cloud providers
Alcatel-Lucent Reports Rising Cases Of Malware And Breaches Of Cybersecurity On Broadband Devices And Smartphones
Products and Releases  |  7/23/2013  | 
New data shows that security threats to fixed and mobile broadband networks are on the rise as global consumer usage continues to grow
Solera Networks Introduces Blue Coat ThreatBLADES
Products and Releases  |  7/23/2013  | 
Solution unifies threat intelligence, big data security analytics, and security visibility
Webroot And RSA Team Up To Deliver Real-Time Phishing Detection
Products and Releases  |  7/23/2013  | 
Companies to provide additional real-time phishing detection to RSA FraudActionSM Anti-Phishing Service
73 Percent Of OpUSA Compromised Sites Were Hosted In Microsoft IIS Web Servers
Products and Releases  |  7/23/2013  | 
Solutionary's Security Engineering Research Team (SERT) has released its Quarterly Threat Report for the second quarter of 2013
Alert Logic To Announce Strong Q2 Results
Products and Releases  |  7/22/2013  | 
To date, Alert Logic has more than 2,200 customers using its Security-as-a-Service solutions
CSIS Releases Study Linking Cybercrime To Job Loss
Products and Releases  |  7/22/2013  | 
McAfee-sponsored report quantifies economic impact of cybercrime
HBGary To Launch New Incident Response Command Center Technology At Black Hat
Products and Releases  |  7/22/2013  | 
V-App for Incident Response Command Center integrates and manages all incident data
BAE Systems And Bayshore Networks Expand Strategic Partnership To Defend Against Advanced Cyber Threats
Products and Releases  |  7/22/2013  | 
BAE Systems will resell and distribute Bayshore’s SingleKey, Bayshore SCADA Firewall, and SingleView
RiskIQ Secures $10 Million Series A Investment From Summit Partners
Products and Releases  |  7/18/2013  | 
RiskIQ uses a global proxy network spanning nearly 40 geographic locations to monitor key websites and mobile applications
21CT Enhances Security Intelligence With LYNXeon v2.29
Products and Releases  |  7/18/2013  | 
Update includes enhanced graph database and inclusion of LYNXeon Connect
Smart Card Alliance Identity Council Urges Use Of Smart Cards For Security, Privacy In NSTIC Identity Ecosystem
Products and Releases  |  7/17/2013  | 
White paper reviews NSTIC initiatives and discusses how smart card technology can provide the credentialing capabilities
Tripwire Announces New Version Of TRIPWIRE Log Center Solution
Products and Releases  |  7/17/2013  | 
Tripwire Log Center solution is powered by the Tripwire VIA agent
SIA Standards To Launch SNMP MIB Project
Products and Releases  |  7/17/2013  | 
Effort will define security-specific set of attributes
Weak Help Desk Security Traced To Lack Of Training, Loose Processes And Too Much 'Helpfulness'
Products and Releases  |  7/17/2013  | 
RSA announces new report by the SANS Institute spotlighting the threats and privacy issues facing help desks
Rapid7 Releases Solutions Portfolio Update
Products and Releases  |  7/17/2013  | 
New capabilities in the release include Metasploit MetaModules that provide automated security testing
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file