Products and Releases

Content posted in August 2014
HP Study Finds Nearly 70 Percent of IT Professionals Experience Weekly Phishing Attacks
Products and Releases  |  8/29/2014  | 
Six out of 10 attacks stem from malicious communication with the command and control site
Belden Introduces Versatile New Industrial Router and Security Appliance
Products and Releases  |  8/29/2014  | 
GarrettCom Magnum 10RX Features Designed to Benefit Power Utility and Transportation Industries
Trend Micro Adds VMware NSX Interoperability
Products and Releases  |  8/28/2014  | 
New capabilities solidify position in cloud and data center security
Netskope and Box Team Up
Products and Releases  |  8/28/2014  | 
Netskope gives IT a way to guide users to Box from unsanctioned apps, prevent data loss in Box across any endpoint, and ensure security for the OneCloud ecosystem
Security-as-a-Service Gets VMware Ready - vCloud Air Status
Products and Releases  |  8/27/2014  | 
Company Brings Managed IDS and Log Management Capabilities to vCloud Air Customers
Bayshore Networks Announces Major Release of SingleView
Products and Releases  |  8/26/2014  | 
Bayshores management component now provides global management and access control for Pallaton policies and YARA rules.
Blue Coat Reveals Security Risks From "One-Day Wonders" Websites
Products and Releases  |  8/26/2014  | 
Research Study finds 470 Million Websites Exist for Less Than 24 hours; 22 Percent Used to Facilitate Attacks
Qubitekk To Receive Federal Funding To Help Protect Nation's Power Grid From Cyber Attack
Products and Releases  |  8/26/2014  | 
DOE provides $3 million grant for quantum encryption technology development.
Let the Hacking Begin: NYU Launches Largest Cyber Security Student Contests
Products and Releases  |  8/25/2014  | 
Yahoo Chief Information Security Officer Alex Stamos to Keynote 11th Annual NYU Polytechnic School of Engineering's Cyber Security Awareness Week Finals
Zumigo Raises $6M to Expand Secure Payments and eCommerce with Mobile Device Location and Identity Verification
Products and Releases  |  8/25/2014  | 
Intel Capital Leads Series B Financing; Latest Funding to Expand Companys Delivery and Development of Mobile Location Intelligence Solutions Uniquely Authenticating and Securing Mobile Commerce
Survey: Impact of Target Data Breach on Cybersecurity Budget, Executive Awareness Diminishing
Products and Releases  |  8/25/2014  | 
Tripwire survey examines views of information security professionals at annual IT security conference
Lastline Secures $10 Million Funding Round
Products and Releases  |  8/25/2014  | 
Funding from Dell Ventures, Presidio Ventures, Redpoint Ventures and eVentures to Extend the Lastline Advanced Malware Defense Platform, Security Team and Strategic Partnerships
Gartner Says Worldwide Information Security Spending Will Grow Almost 8 Percent in 2014 as Organizations Become More Threat-Aware
Products and Releases  |  8/22/2014  | 
Analysts to discuss security trends at Gartner's 2014 Security and Risk Management Summits August 25-26 in Sydney, September 8-9 in London and September 15-16 in Dubai.
LogRhythm Launches Threat Intelligence Ecosystem and Related Security Analytics Suite to Detect High-Risk Cyber Threats
Products and Releases  |  8/22/2014  | 
CrowdStrike, Norse, Symantec, ThreatStream and Webroot Join Industrys First and Only Threat Intelligence Ecosystem
Lumeta Joins Amazon Web Services Marketplace
Products and Releases  |  8/21/2014  | 
Lumeta ESI Real-Time Network Situational Awareness Now Available for AWS Subscribers
Report: 61% of enterprises not prepared for insider threats
Products and Releases  |  8/21/2014  | 
Majority Do Not Believe They Are Adequately Prepared, Leaving Enterprises Vulnerable to Fraud, Data Breaches and IP Theft
New Englands Advanced Cyber Security Center and the Western Cyber Exchange Demonstrate Major Cybersecurity Advancement
Products and Releases  |  8/20/2014  | 
Exchange demonstrated the possibility of a national and global network of organizations sharing cyber threat information.
vArmour Raises $36 Million to Protect the Data Defined Perimeter
Products and Releases  |  8/20/2014  | 
Menlo Ventures, Columbus Nova Technology Partners And Citi Ventures Contribute Funds to Accelerate Development Of Disruptive Technology, Scale To Meet Global Demand
More than Half of Consumers Share Passwords Leading to Security Concerns
Products and Releases  |  8/19/2014  | 
Research reveals consumers leaving back door open to hackers by signing up for automatic log in options.
Lumen21 Launches HITRUST Compliant Cloud Computing Solution
Products and Releases  |  8/19/2014  | 
Secure Infrastructure-as-a-Service environment is fully compliant with Healthcare, Financial services, Retail and other industry regulations
GuardiCore Raises $11 Million for Data Center Security in Financing Round Led by Battery Ventures
Products and Releases  |  8/18/2014  | 
Advanced, Scalable Network Security Protects Modern Data Centers from Cyber-attacks
IBM Acquires Cloud Security Services Provider Lighthouse Security Group
Products and Releases  |  8/14/2014  | 
Simplifies Identity Protection in the Age of Mobile, Social and Cloud
The Mind of Hackers: 86% Dont Believe Theyll Face Repercussions
Products and Releases  |  8/14/2014  | 
Thycotic Black Hat 2014 Hacker Survey also finds 88% of hackers fear theft from other hackers
ICANN Approves Name Collision Occurrence Management Framework
Products and Releases  |  8/13/2014  | 
Special IP Address (127.0.53.53) Alerts System Administrators of Potential Issue
Thoma Bravo to Make Significant Investment in SailPoint
Products and Releases  |  8/13/2014  | 
SailPoint Poised for Continued Aggressive Growth
Porticor Enhances Microsoft SQL Server Encryption With Cloud Key Management Security For Complete Database Protection
Products and Releases  |  8/12/2014  | 
Porticor virtual private data system leverages software-defined key management to eliminate complexities and risks found in traditional hardware encryption security modules
Pwnie Express Announces Pwn Pulse SaaS Security Assessment Solution
Products and Releases  |  8/12/2014  | 
Solution Enterprise-class Offering Combines Pwnie Express Sensors with Central Management for Remote Location Intelligence
Survey: 80 Percent of IT Security Professionals Say They Can Detect a Data Breach on Critical Systems Within a Week
Products and Releases  |  8/12/2014  | 
Tripwire survey examines views of information security professionals at annual IT security conference
New Visa Service to Help Gas Station Retailers Reduce Fraud at the Pump
Products and Releases  |  8/12/2014  | 
Intelligent analytics help merchants identify fraud before it happens; Fraud rate dropped more than 20 percent in pilot test
Vectra Networks Raises $25M to Empower Enterprises in Their Battle Against Cyber Attacks
Products and Releases  |  8/12/2014  | 
Accel Partners Leads Series C Funding with Eric Wolford Joining the Vectra Board; Latest Financing Further Validates Vectras Unique Approach of Detecting and Prioritizing Cyber Attacks in Real Time
Whitebox Securitys New Version Accelerates Compliance & Data Governance
Products and Releases  |  8/12/2014  | 
WhiteOPSTM increases management oversight, delivers 360O forensics, and provides What If analysis
BlackBerry Further Expands Security Credentials with New Government Approval for Multi-Platform Management
Products and Releases  |  8/12/2014  | 
Secure Work Space for iOS and Android receives Security Technical Implementation Guide approval for the U.S. Department of Defense
SilverSky partners w/ CTC
Products and Releases  |  8/12/2014  | 
Partnership with Leading IT Solutions Provider in Japan will drive global growth of SilverSkys Managed Security Services
Oracle Customers Secure Critical Encryption Keys With Oracle Key Vault
Products and Releases  |  8/7/2014  | 
New solution enables centralized management of Oracle Database encryption master keys, Oracle wallet files, Java KeyStores, and more.
Core Security Helps Customers Protect Critical Business Assets At Risk
Products and Releases  |  8/6/2014  | 
Think Like An Attacker technology uses advanced analytics to identify and prioritize vulnerabilities for remediation.
6Scan Announces Automated Malware Quarantine for Websites
Products and Releases  |  8/5/2014  | 
New protection works at the web application layer to respond in real time to emerging malware threats
RiskIQ Provides X-Ray Visibility Into Security Threats Outside The Firewall
Products and Releases  |  8/5/2014  | 
Platform automates global discovery, assessment and intelligence gathering to remediate malware planted in companies' websites and mobile apps.
Caution: Second Generation Ransomware in the Wild
Products and Releases  |  8/5/2014  | 
Microsemi Continues its FPGA Security Leadership for Secure Boot
Products and Releases  |  8/5/2014  | 
Significantly Increasing Security for Critical Communication, Industrial and Defense Applications, Patent Solution Provides Resistance to DPA Attacks
Digital Guardian Debuts at Black Hat Security Conference
Products and Releases  |  8/5/2014  | 
Verdasys re-launches under companys flagship product name, reflecting its focus on guarding data as the network perimeter dissolves and attacks from insiders and outsiders grow more sophisticated
OpenDNS Makes 3D Cyber-Attack Detection Technology Freely Available
Products and Releases  |  8/5/2014  | 
OpenGraphiti Enables Security Researchers to Easily Analyze Massive Amounts of Data to Detect Patterns and Uncover Threats
Device-Based Mass-Market Authentication Rollout
Products and Releases  |  8/4/2014  | 
Gillibrand Introduces New Cyber-Security Legislation After New 9/11 Commission Report Released Last Week Concluded A "9/10 Ability To Protect Against Cyber-Attacks"
Products and Releases  |  8/3/2014  | 
New Cyber Information Sharing Tax Credit Would Incentivize Critical Infrastructure Businesses to Join Information-Sharing Organizations to Strengthen Their Cyber Security
Onapsis Research Labs releases six new critical security advisories for companies using SAP
Products and Releases  |  8/1/2014  | 
Latest threats target key administration capabilities for SAP HANA and allow remote attackers to access restricted functionality to gain access to any organizations secure information


6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.