Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in July 2017
AppGuard Relaunches With $50 Million Investment
Products and Releases  |  7/31/2017  | 
Endpoint cybersecurity company also announces a number of Symantec Japan executives have Joined the Company, including former President and CTO.
Duo Security Partners With VMware to Tackle Unmanaged Devices
Products and Releases  |  7/31/2017  | 
The partnership is designed to address the influx of unmanaged devices accessing corporate applications.
Experian uses alternative data to help verify international identities
Products and Releases  |  7/31/2017  | 
Experian uses alternative data to help verify international identities Email verification and email attributes can help companies validate customers even when they are residing out of their home.
Capsule8 Launches Threat Prevention and Response Platform Beta for Cloud-Native Environments
Products and Releases  |  7/28/2017  | 
Company Providing Private Demonstrations at Black Hat USA
No More Ransom celebrates its first year
Products and Releases  |  7/25/2017  | 
Over 28,000 devices decrypted and 100+ global partners signed up.
Nyotron Raises $21 Million Funding Round
Products and Releases  |  7/24/2017  | 
Appoints Former McAfee Executive Peter Stewart to Chief Executive Officer.
Checkmarx Acquires Codebashing to Redefine Secure Coding Education
Products and Releases  |  7/24/2017  | 
Through Acquisition, Checkmarx will Provide Interactive Tools to Further Developer Application Security Knowledge and Deliver Secure Applications Even Faster.
FireEye Assisting National Police of Ukraine with Recent EternalPetya Investigation
Products and Releases  |  7/24/2017  | 
Security firm is assisting law enforcement with forensic investigation of physical machines and data affected by the cyber attack.
Internet Bug Bounty Receives New Funding to Expand Internet Safety Program
Products and Releases  |  7/21/2017  | 
Facebook, Ford Foundation and GitHub donate $300,000 to award hackers who improve internet infrastructure
TeamLogic IT Helps Small Businesses Develop Cybersecurity Roadmap
Products and Releases  |  7/21/2017  | 
Managed IT Services Franchise Brings Education and Awareness to the Front Line of Ransomware.
New RiskSense Service Detects IoT and OT Network Security Threats/Vulnerabilities
Products and Releases  |  7/21/2017  | 
Cyber Risk Management Leader Announces New Offering to Cover Emerging Technologies and Environments including Smart Logistics Systems, Internet of Things, and Automotive Control Systems
Check Point Teams with Microsoft Intune to Secure Enterprise Mobility
Products and Releases  |  7/21/2017  | 
Check Point integrates its SandBlast Mobile with a Microsoft enterprise mobility product.
88% of Retailers Believe They are at Risk of Data Threats
Products and Releases  |  7/21/2017  | 
Yearly data breach rate drops from 22% to 19% those breached at any time 52%.
Acalvio Partners with Splunk on Active Deception-Based Ransomware Solution
Products and Releases  |  7/21/2017  | 
Free Trial of ShadowPlex-R Offers Organizations the Ability to Test Drive Deception 2.0-Based Solution. .
ScaleFT Closes $2M Seed Funding, Launches Zero Trust Solution for Cloud Security
Products and Releases  |  7/19/2017  | 
Inspired by Google's BeyondCorp architecture, ScaleFT Zero Trust Access Management protects corporate resources without VPNs
Less than One-Third of Companies Unprepared to Meet EU GDPR
Products and Releases  |  7/18/2017  | 
Less than a third of organizations believe they are compliant or on the way to compliance; 30% state that they will need to make substantial changes to be compliant.
Bay Dynamics Announces Technology Partnership with Symantec to Detect and Stop Insider Threats
Products and Releases  |  7/18/2017  | 
Bay Dynamics User and Entity Behavior Analytics (UEBA) Technology Partnership with Symantec Enables Organizations to Identify Malicious Insiders & Prioritize Threats to Data Assets
Onapsis Identifies and Helps Oracle Secure Critical Vulnerability in E-Business Suite (EBS)
Products and Releases  |  7/18/2017  | 
In advance of annual Black Hat conference, Onapsis Research Labs threat intelligence protects Oracle customers from severe risks affecting EBS-based platforms
Black Duck Teams Up with Pivotal to Secure and Manage Open Source Cloud-Native Applications for the Enterprise
Products and Releases  |  7/18/2017  | 
Collaboration integrates Black Duck Hub and Pivotal Cloud Foundry to deliver a Secure DevOps process and user experience
Tozny Launches End-To-End Data Security Encryption Toolkit For Developers
Products and Releases  |  7/18/2017  | 
InnoVault toolkit enables developers building websites, apps, and software to easily embed end-to-end data security and privacy.
Minerva Boosts Anti-Evasion Platform Capabilities
Products and Releases  |  7/18/2017  | 
Expands deception-based approach for endpoint security to fight broader evasive malware techniques.
SIEM Complexities Increase IR Costs, Decrease IR Productivity
Products and Releases  |  7/17/2017  | 
New Report from Cyphort and Osterman Research Puts Spotlight on SIEM User Challenges and How Incident Responders Spend Their Time
States Pledge to Meet Cyber Threats
Products and Releases  |  7/14/2017  | 
Outgoing National Governors Association Chair Gov. McAuliffe Sunsets his Initiative, 38 Governors Sign Compact
Flashpoint Announces $28 Million Series C Led by Georgian Partners
Products and Releases  |  7/12/2017  | 
Increasing global demand for business risk intelligence (BRI) drives latest funding round with new partner and existing investors.
Cylance Integrates AI-driven Engine into VirusTotal
Products and Releases  |  7/11/2017  | 
RiskLens Secures $5 Million Series A Equity Investment
Products and Releases  |  7/11/2017  | 
High-profile industry commendation results in back-to-back OpRisk award wins for RiskLens, cementing its leadership position as the provider of choice for purpose-built risk quantification solutions.
Portnox Rapid Ransomware Response and Control Aims to Aid Recovery from Attacks
Products and Releases  |  7/11/2017  | 
Using full network visibility, Portnox monitors and disconnects infected devices during ransomware attacks, speeding up recovery time.
HPE Software Boosts Security in its Backup Suite
Products and Releases  |  7/11/2017  | 
HPE Adaptive Backup and Recovery Suite delivers secure approach to data protection, simplifying complexity and reducing costs.
IBM, Ponemon: Business Continuity Management Helps Save Time and Cost Post-Breach
Products and Releases  |  7/7/2017  | 
Cloud resiliency orchestration is transforming business continuity to help companies achieve consistent business objectives.
FIRST Releases Practices for Multi-Party Vulnerability Coordination and Disclosure
Products and Releases  |  7/6/2017  | 
The Forum of Incident Response and Security Teams announces the release of a set of guidelines and norms for vulnerability disclosure that affects multiple parties.
Cloud Security Vendor, ShieldX, Emerges From Stealth
Products and Releases  |  7/5/2017  | 
Recognized as a Gartner 'Cool Vendor' in 2017, SheildX emerges with a new cloud security product: APEIRO.
Cloud Identity Leader Auth0 Adds $30 Million Series C
Products and Releases  |  7/5/2017  | 
Company revenue grows three-fold year-over-year as customer base extends across multiple industries. Auth0 will use the new funds to double down on security, extensibility, and simplicity.
Retail Cyber Intelligence Sharing Center Names New Executive Director
Products and Releases  |  7/5/2017  | 
The Retail Cyber Intelligence Sharing Center (R-CISC) will expand its sharing capabilities in the coming months.

COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
PUBLISHED: 2020-09-30
In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .
PUBLISHED: 2020-09-30
A DLL Hijacking vulnerability in Eaton's 9000x Programming and Configuration Software v 2.0.38 and prior allows an attacker to execute arbitrary code by replacing the required DLLs with malicious DLLs when the software try to load vci11un6.DLL and cinpl.DLL.