Products and Releases

Content posted in July 2017
AppGuard Relaunches With $50 Million Investment
Products and Releases  |  7/31/2017  | 
Endpoint cybersecurity company also announces a number of Symantec Japan executives have Joined the Company, including former President and CTO.
Duo Security Partners With VMware to Tackle Unmanaged Devices
Products and Releases  |  7/31/2017  | 
The partnership is designed to address the influx of unmanaged devices accessing corporate applications.
Experian uses alternative data to help verify international identities
Products and Releases  |  7/31/2017  | 
Experian uses alternative data to help verify international identities Email verification and email attributes can help companies validate customers even when they are residing out of their home.
Capsule8 Launches Threat Prevention and Response Platform Beta for Cloud-Native Environments
Products and Releases  |  7/28/2017  | 
Company Providing Private Demonstrations at Black Hat USA
No More Ransom celebrates its first year
Products and Releases  |  7/25/2017  | 
Over 28,000 devices decrypted and 100+ global partners signed up.
Nyotron Raises $21 Million Funding Round
Products and Releases  |  7/24/2017  | 
Appoints Former McAfee Executive Peter Stewart to Chief Executive Officer.
Checkmarx Acquires Codebashing to Redefine Secure Coding Education
Products and Releases  |  7/24/2017  | 
Through Acquisition, Checkmarx will Provide Interactive Tools to Further Developer Application Security Knowledge and Deliver Secure Applications Even Faster.
FireEye Assisting National Police of Ukraine with Recent EternalPetya Investigation
Products and Releases  |  7/24/2017  | 
Security firm is assisting law enforcement with forensic investigation of physical machines and data affected by the cyber attack.
Internet Bug Bounty Receives New Funding to Expand Internet Safety Program
Products and Releases  |  7/21/2017  | 
Facebook, Ford Foundation and GitHub donate $300,000 to award hackers who improve internet infrastructure
TeamLogic IT Helps Small Businesses Develop Cybersecurity Roadmap
Products and Releases  |  7/21/2017  | 
Managed IT Services Franchise Brings Education and Awareness to the Front Line of Ransomware.
New RiskSense Service Detects IoT and OT Network Security Threats/Vulnerabilities
Products and Releases  |  7/21/2017  | 
Cyber Risk Management Leader Announces New Offering to Cover Emerging Technologies and Environments including Smart Logistics Systems, Internet of Things, and Automotive Control Systems
Check Point Teams with Microsoft Intune to Secure Enterprise Mobility
Products and Releases  |  7/21/2017  | 
Check Point integrates its SandBlast Mobile with a Microsoft enterprise mobility product.
88% of Retailers Believe They are at Risk of Data Threats
Products and Releases  |  7/21/2017  | 
Yearly data breach rate drops from 22% to 19% those breached at any time 52%.
Acalvio Partners with Splunk on Active Deception-Based Ransomware Solution
Products and Releases  |  7/21/2017  | 
Free Trial of ShadowPlex-R Offers Organizations the Ability to Test Drive Deception 2.0-Based Solution. .
ScaleFT Closes $2M Seed Funding, Launches Zero Trust Solution for Cloud Security
Products and Releases  |  7/19/2017  | 
Inspired by Google's BeyondCorp architecture, ScaleFT Zero Trust Access Management protects corporate resources without VPNs
Less than One-Third of Companies Unprepared to Meet EU GDPR
Products and Releases  |  7/18/2017  | 
Less than a third of organizations believe they are compliant or on the way to compliance; 30% state that they will need to make substantial changes to be compliant.
Bay Dynamics Announces Technology Partnership with Symantec to Detect and Stop Insider Threats
Products and Releases  |  7/18/2017  | 
Bay Dynamics User and Entity Behavior Analytics (UEBA) Technology Partnership with Symantec Enables Organizations to Identify Malicious Insiders & Prioritize Threats to Data Assets
Onapsis Identifies and Helps Oracle Secure Critical Vulnerability in E-Business Suite (EBS)
Products and Releases  |  7/18/2017  | 
In advance of annual Black Hat conference, Onapsis Research Labs threat intelligence protects Oracle customers from severe risks affecting EBS-based platforms
Black Duck Teams Up with Pivotal to Secure and Manage Open Source Cloud-Native Applications for the Enterprise
Products and Releases  |  7/18/2017  | 
Collaboration integrates Black Duck Hub and Pivotal Cloud Foundry to deliver a Secure DevOps process and user experience
Tozny Launches End-To-End Data Security Encryption Toolkit For Developers
Products and Releases  |  7/18/2017  | 
InnoVault toolkit enables developers building websites, apps, and software to easily embed end-to-end data security and privacy.
Minerva Boosts Anti-Evasion Platform Capabilities
Products and Releases  |  7/18/2017  | 
Expands deception-based approach for endpoint security to fight broader evasive malware techniques.
SIEM Complexities Increase IR Costs, Decrease IR Productivity
Products and Releases  |  7/17/2017  | 
New Report from Cyphort and Osterman Research Puts Spotlight on SIEM User Challenges and How Incident Responders Spend Their Time
States Pledge to Meet Cyber Threats
Products and Releases  |  7/14/2017  | 
Outgoing National Governors Association Chair Gov. McAuliffe Sunsets his Initiative, 38 Governors Sign Compact
Flashpoint Announces $28 Million Series C Led by Georgian Partners
Products and Releases  |  7/12/2017  | 
Increasing global demand for business risk intelligence (BRI) drives latest funding round with new partner and existing investors.
Cylance Integrates AI-driven Engine into VirusTotal
Products and Releases  |  7/11/2017  | 
RiskLens Secures $5 Million Series A Equity Investment
Products and Releases  |  7/11/2017  | 
High-profile industry commendation results in back-to-back OpRisk award wins for RiskLens, cementing its leadership position as the provider of choice for purpose-built risk quantification solutions.
Portnox Rapid Ransomware Response and Control Aims to Aid Recovery from Attacks
Products and Releases  |  7/11/2017  | 
Using full network visibility, Portnox monitors and disconnects infected devices during ransomware attacks, speeding up recovery time.
HPE Software Boosts Security in its Backup Suite
Products and Releases  |  7/11/2017  | 
HPE Adaptive Backup and Recovery Suite delivers secure approach to data protection, simplifying complexity and reducing costs.
IBM, Ponemon: Business Continuity Management Helps Save Time and Cost Post-Breach
Products and Releases  |  7/7/2017  | 
Cloud resiliency orchestration is transforming business continuity to help companies achieve consistent business objectives.
FIRST Releases Practices for Multi-Party Vulnerability Coordination and Disclosure
Products and Releases  |  7/6/2017  | 
The Forum of Incident Response and Security Teams announces the release of a set of guidelines and norms for vulnerability disclosure that affects multiple parties.
Cloud Security Vendor, ShieldX, Emerges From Stealth
Products and Releases  |  7/5/2017  | 
Recognized as a Gartner 'Cool Vendor' in 2017, SheildX emerges with a new cloud security product: APEIRO.
Cloud Identity Leader Auth0 Adds $30 Million Series C
Products and Releases  |  7/5/2017  | 
Company revenue grows three-fold year-over-year as customer base extends across multiple industries. Auth0 will use the new funds to double down on security, extensibility, and simplicity.
Retail Cyber Intelligence Sharing Center Names New Executive Director
Products and Releases  |  7/5/2017  | 
The Retail Cyber Intelligence Sharing Center (R-CISC) will expand its sharing capabilities in the coming months.


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11311
PUBLISHED: 2018-05-20
A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.
CVE-2018-11319
PUBLISHED: 2018-05-20
Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to ...
CVE-2018-11242
PUBLISHED: 2018-05-20
An issue was discovered in the MakeMyTrip application 7.2.4 for Android. The databases (locally stored) are not encrypted and have cleartext that might lead to sensitive information disclosure, as demonstrated by data/com.makemytrip/databases and data/com.makemytrip/Cache SQLite database files.
CVE-2018-11315
PUBLISHED: 2018-05-20
The Local HTTP API in Radio Thermostat CT50 and CT80 1.04.84 and below products allows unauthorized access via a DNS rebinding attack. This can result in remote device temperature control, as demonstrated by a tstat t_heat request that accesses a device purchased in the Spring of 2018, and sets a ho...
CVE-2018-11239
PUBLISHED: 2018-05-19
An integer overflow in the _transfer function of a smart contract implementation for Hexagon (HXG), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets by providing a _to argument in conjunction with a large _value argument, as exploited in the wild in ...