Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in July 2015
Page 1 / 2   >   >>
Google Ventures-backed Rocana Launches "Rocana Ops"
Products and Releases  |  7/31/2015  | 
Rocana Ops Is the First Product to Market Using Big Data and Advanced Analytics to Address $20 Billion Dollar IT Operations Management Market
Comilion Makes Secure and Private Cyber Security Collaboration between Enterprises Possible
Products and Releases  |  7/31/2015  | 
The company announces the definitive secured collaboration platform between companies
Nearly 80 Percent Of Consumers Think Vehicle Hacking Will Be Frequent Problem In Near Future, According To New Kelley Blue Book Survey
Products and Releases  |  7/31/2015  | 
Almost Half Will Consider News of Recent Vehicle Hacking Incident When Buying/Leasing Next Car; Domestic Auto Manufacturers Deemed Most Susceptible to Vehicle Hacking
Shellshock Activity Still Tracked to 138 Countries in Solutionary Q2 2015 SERT Threat Report
Products and Releases  |  7/31/2015  | 
U.S. and China Lead Top Sources of Command and Control Traffic; 48 Percent of Top 25 Hostile Non-U.S. IP Addresses Are "Bruteforce" Repeat Offenders
Blue Coat Acquires Perspecsys
Products and Releases  |  7/30/2015  | 
Expands portfolio in exploding cloud security market, providing relief for multinational enterprises struggling with data compliance requirements & regional sovereigntyregulations
Most Major Financial Hacks Completely Covered Up
Products and Releases  |  7/30/2015  | 
Lieberman Software survey reveals most companies are persistently targeted by cyber attacks and the public only finds out about a small portion of security breaches
Products and Releases  |  7/29/2015  | 
Security researchers will release groundbreaking vulnerabilities and cutting-edge RFID hacking methods
IOActive Turns Las Vegas into a Smart City during Black Hat and DEF CON
Products and Releases  |  7/29/2015  | 
Company to showcase series of research centered on math, physics, advanced technology, and SCADA
Accenture Survey: Companies Faced With Cyberattacks Daily Are Not Prepared
Products and Releases  |  7/29/2015  | 
Nearly two-thirds of C-suite executives surveyed indicate that cyberattacks occur daily or weekly.
OWASP Announces Final Agenda and Lightning Trainings for AppSec USA 2015 Conference
Products and Releases  |  7/28/2015  | 
Facebook CSO, Microsoft MVP and Department of Homeland Security Chief Cybersecurity Officer Join AppSec Experts to Discuss Current Threat Landscape
CYREN Unveils First Mass-Scale Sandbox Service
Products and Releases  |  7/28/2015  | 
Company introduces next generation of sandbox technology with automated logic and a global cloud infrastructure
Icon Labs Releases Security Management System
Products and Releases  |  7/28/2015  | 
Icon Labs Floodgate Security Manager provides security management for Internet of Things (IoT), Industrial Control, Medical, Smart Grid and DoD Devices. New Security Management System provides security management that scales to IoT edge devices, including mobile, wireless, battery powered and mesh-based IoT sensors.
Farsight Security To Relaunch Security Information Exchange at Black Hat USA
Products and Releases  |  7/28/2015  | 
2015 Worlds Largest, Real-Time Threat Intelligence Information Technology Platform Offers Four New Technologies To Provide Unprecedented Visibility on Changing Internet
PwC Germany and Imperva to Deliver New Cyber Security Solution
Products and Releases  |  7/28/2015  | 
PwC all4cloud Offering to Leverage Imperva Incapsula and Imperva Skyfence to Protect Cloud-Based Applications
Next Generation of Comodos Enterprise Endpoint Security Solution Now Available
Products and Releases  |  7/28/2015  | 
Automatic Containment Technology at the Heart of Comodo ESM 3.4 to Keep Customers Protected From Known and Unknown Threats
Balabit launches eCSI Hacker Playground Competition for Black Hat USA 2015
Products and Releases  |  7/23/2015  | 
Top International Security Provider Teams With Silent Signal to Sponsor Hacker Challenge With Prizes of a Ticket to BlackHat Europe 2015, MacBook Air, Lego Mindstorms and More
OpenDNS Delivers New Release of Investigate Threat Intelligence Product
Products and Releases  |  7/23/2015  | 
OpenDNSs security search engine makes threat intelligence both interactive and actionable with access to contextual data
Fortscale Enhances Insider Threat Offering
Products and Releases  |  7/22/2015  | 
Operational Workflow Integration, Enhanced Behavior Analytics and Rapid Response Toolbox Among New Features in Version 1.4 that Cuts Response Time By Up to 30 Percent
Security Mentor Expands Gamification Experience Encouraging Greater Employee Participation and Engagement
Products and Releases  |  7/22/2015  | 
Security Awareness Training Leader Adds New Game-Based Learning Capabilities Increasing Engagement and Propelling Program Success
RSA Debuts New Lifecycle and Governance Identity Solution
Products and Releases  |  7/22/2015  | 
New Capabilities Speed Detection of Unauthorized Privilege Escalation and Remediation of Account Compromise
Spikes Security Names Industry Veteran Michael Mansouri President and COO
Products and Releases  |  7/22/2015  | 
Successful Serial Entrepreneur and Technology Visionary Brings 30 Years of Leadership Experience in Global High Tech Businesses to Security Start-Up
Symantec to Deliver Keynote at GlobalPlatforms Annual TEE Conference
Products and Releases  |  7/22/2015  | 
Agenda will address the role of the TEE in securing connected devices, standardization, use cases, certification and security evaluation
Gigamon Launches Security Delivery Platform
Products and Releases  |  7/21/2015  | 
Unveils GigaSECURE for Pervasive Visibility of Network Traffic and Delivers it to Multiple Security Devices Simultaneously without Impacting Network Availability
Pitney Bowes Announces Communications Hub For SMBs
Products and Releases  |  7/21/2015  | 
Metascan Now Supports Linux With Enhanced Security And Scalability
Products and Releases  |  7/21/2015  | 
OPSWAT adds support for Linux to their Multi Anti-Malware Scanner Metascan to provide enhanced security, scalability, and usability.
Ziften Rolls Out Next-Gen Endpoint Solution
Products and Releases  |  7/21/2015  | 
Ziftens Next-gen Endpoint Security Solution Deploys in Minutes to Immediately Discover, Analyze, and Seal Security Exposures Where Businesses are Most Vulnerable
Pulse Secure Unveils Next Generation Platform to Power Mobile Access to Datacenter Applications and Cloud Services
Products and Releases  |  7/21/2015  | 
High Performance Pulse Secure Appliance with Centralized Management Provides Breakthrough Performance with Operational Scale and Simplicity
IT Decision Makers Cite Lack of Time, Deployment Expertise as Top Obstacles to EMV Readiness
Products and Releases  |  7/21/2015  | 
New Randstad Technologies Survey Finds 40 Percent of Businesses Wont Meet October Liability Shift Deadline
KnowBe4 Automates Security Awareness Training for IT
Products and Releases  |  7/20/2015  | 
Most requested feature added to Kevin Mitnick Security Awareness Training
Rook Security Collaborates With FBI Indianapolis Cyber Task Force On Threat Intelligence To Reduce Impact Of Hacking Team Breach
Products and Releases  |  7/17/2015  | 
Indianapolis Security Firm Takes Industry Lead with Comprehensive Analysis of Breached Weaponizable Files; Releases Free Automated Detection Tool to Help Companies Know if They are Affected
Verizon Unveils New Managed Service
Products and Releases  |  7/17/2015  | 
Proactive Privacy Practices Can Mitigate Damage from Data Breach
Products and Releases  |  7/16/2015  | 
TRUSTe expands privacy solutions to help companies minimize potential damages with data breach response plan
SMBs at Risk of Data Privacy Threats
Products and Releases  |  7/15/2015  | 
Nominations Announced for Women in Security Awards 2015
Products and Releases  |  7/15/2015  | 
Duo Security Presents its First Annual Women in Security Awards
CounterTack Acquires ManTech Cyber Solutions International to Deliver Endpoint Detection and Response Capabilities
Products and Releases  |  7/15/2015  | 
Acquisition Supports Aggressive Go-to-Market Expansion to Surpass its 200+ Customers by Combining Real-Time Behavioral Threat Detection with In-Memory Endpoint Threat Analysis
IKANOW Optimizes Enterprise Security with Updated Analytics Platform
Products and Releases  |  7/15/2015  | 
Adds Scalability, Flexibility, Performance; Combines SIEM and Threat Intelligence Data with Customized, Robust Analytics
IOActive Joins the Institute for Critical Infrastructure Technology
Products and Releases  |  7/15/2015  | 
Companys Smart Cities research to be used to educate U.S. Senate and U.S. House of Representatives on security issues
Malwarebytes Releases Mac Product and Acquires AdwareMedic Giving Mac Users Malware Detection and Removal Capabilities
Products and Releases  |  7/15/2015  | 
Release of Malwarebytes Anti-Malware for Mac brings powerful security layer to Mac users; Acquisition to build on current OS X protection capabilities
ThreatConnect Debuts New TC Exchange Offering
Products and Releases  |  7/15/2015  | 
Leveraging a True Threat Intelligence Platform, Organizations Now Have Ability to Build, Host and Exchange Customized Secure Applications for Improved Intel Gathering
Vietnamese National Sentenced to 13 Years in Prison for Operating a Massive International Hacking and Identity Theft Scheme
Products and Releases  |  7/14/2015  | 
Hieu Minh Ngo stole and sold personally identifiable information on approximately 200 million U.S. citizens.
Vectra Networks Discovers High Severity Internet Explorer 11 Vulnerability Following Hacking Team Cyber Attack
Products and Releases  |  7/14/2015  | 
Vectra Threat Lab Finds Exploitable Use-After-Free Vulnerability that Can Let Attackers Bypass Standard Memory Protections in Popular Web Browser
Verint Enhances Its Identity Authentication Offering
Products and Releases  |  7/14/2015  | 
Solution Advancements Enable a More Efficient Approach to Identity Authentication to Help Safeguard Customers, Save Time and Reduce Interaction Costs
Corero Network Security Survey Finds Degradation of Customer Confidence and Lost Revenues are the Most Damaging Ramifications of DDoS Attacks
Products and Releases  |  7/14/2015  | 
Study Highlights the Effects of DDoS Attacks and How Businesses are Addressing the Threat Today
Wombat Security Expands Security Awareness Training Capabilities with Bit9 + Carbon Black Partnership
Products and Releases  |  7/13/2015  | 
New Technology Partnership Enables Businesses to Sense and Interrupt Risky Employee Behavior With "Just-in-Time" Training to Lower Cyber Security Vulnerabilities
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file