Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in August 2015
Gigamon Teams with RSA
Products and Releases  |  8/31/2015  | 
Gigamon and RSA Bring Best of Breed Visibility to Software-Defined Data Centers
FireHost Is Now Armor, for Active Cyber Defense Focused on Outcomes
Products and Releases  |  8/31/2015  | 
Armor delivers dwell times 100 times shorter than the 205-­day industry average
Security Pros @ Black Hat Say C-Suite Has "Head in the Sand," Not Paranoid Enough
Products and Releases  |  8/27/2015  | 
Survey Conducted During BSides Conference at Black Hat Includes Responses from Senior Security Executives at Fortune 1000 Companies
NEW NET TECHNOLOGIES DEBUTS CHANGE TRACKER™ GENERATION 7
Products and Releases  |  8/27/2015  | 
Marks the next generation of continuous breach prevention with intelligent file integrity monitoring and security configuration management
Zombie IPs Added to IID’sThreat Intelligence Exchange
Products and Releases  |  8/26/2015  | 
Intelligence around phishing threats and malicious IP addresses being used for botnets added into one of the world’s largest commercial cyberthreat data exchanges
Cyphort Labs Issues Special Report on the Rise in Malvertising Cyber Attacks
Products and Releases  |  8/25/2015  | 
Cyphort Researchers Find Malvertising Campaigns Increased 325 Percent Through Early 2015
Cybrary Raises $400K in Seed Funding, Tackles Cyber Security Skills Gap and Workforce Shortage
Products and Releases  |  8/25/2015  | 
Financing Led By Inner Loop Capital and New Stack Ventures
New Net Technologies Announces Next Generation Breach Prevention And Detection Solution: Change Tracker™ Generation 7
Products and Releases  |  8/25/2015  | 
Change Tracker Gen 7 marks the next generation of continuous breach prevention with intelligent file integrity monitoring and security configuration management powered by Closed-Loop Intelligent Change Control -
Kaspersky Lab Adds Device-Reputation Fraud Prevention
Products and Releases  |  8/25/2015  | 
Kaspersky Fraud Prevention paired with iovation’s device-based fraud prevention to protect businesses and consumers
Mobile & Wearable Devices Drive Adoption of Biometrics in Banking
Products and Releases  |  8/25/2015  | 
Over 622 million mobile banking app downloads and almost 160 million wearable devices supporting biometrics for banking by 2020
Nok Nok Labs Announces Close of $16.25M Series C Funding Round
Products and Releases  |  8/25/2015  | 
New Strategic Investors Based in South Korea, China and Japan Validate Strong Momentum in FIDO Ecosystem
ThreatMetrix Cybercrime Report: Q2 2015 Sees Increase in Mobile Transactions and Online Lending Fraud
Products and Releases  |  8/23/2015  | 
Quarterly Report Examines Cybercrime Attacks Detected by the ThreatMetrix Digital Identity Network, Which Analyzes More Than One Billion Transactions Monthly
AlienVault Closes New Financing Round of $52 Million Led by Institutional Venture Partners
Products and Releases  |  8/19/2015  | 
Investment Accelerates Innovation, Speeds Growth in Unified Security Management, Threat Intelligence Markets
Raytheon|Websense Survey Reveals Executives Lack Confidence in Security Posture
Products and Releases  |  8/19/2015  | 
Nearly nine in 10 organizations have had at least one breach that resulted in a loss or compromise of data in the past year.
Cryptzone Appoints Cybersecurity Expert Leo Taddeo as CSO
Products and Releases  |  8/18/2015  | 
Former FBI Special Agent in Charge Joins Security Solutions Leader to Provide Strategic Direction and Security Insight
GuardiCore Expands Executive Leadership Team
Products and Releases  |  8/18/2015  | 
Industry veterans from Check Point, Imperva, IXIA and CTERA Join GuardiCore to Accelerate Expansion of Data Center Active Attack Security
iSheriff Names Eric Lundbohm as Chief Marketing Officer
Products and Releases  |  8/18/2015  | 
Security Industry Expert Joins iSheriff to Fuel Cloud Security Company's Growth
75% of Hackers Say Privileged Accounts Are Still Easy to Compromise
Products and Releases  |  8/18/2015  | 
Thycotic Black Hat 2015 Hacker Survey also finds 94% of hackers have found privileged account credentials in unprotected files
Message Systems Partners with Twitter to Empower Premiere Email Privacy Initiative
Products and Releases  |  8/11/2015  | 
New tool developed by both companies demonstrates commitment to transparent security
Menlo Security Partners With Webroot To Bring Threat Intel, Machine Learning to Isolation
Products and Releases  |  8/11/2015  | 
Collective Threat Intelligence and sophisticated machine learning provide granular threat intelligence for Menlo Security Isolation Platform
BrightPoint Security Broadens availability of Threat Intel platform across ISAC/ISAO Orgs
Products and Releases  |  8/11/2015  | 
All ISACs/ISAOs can Benefit from Proven Solution Leveraged by NH-ISAC to Offer Threat Intelligence Sharing to Members for Free
Lumeta Announces ESI 3.0, Empowering Organizations with Real-Time Cybersecurity Intelligence
Products and Releases  |  8/11/2015  | 
Industry leader in network situational awareness introduces Big Data and Advanced Analytics in its flagship product to help organizations address network vulnerabilities and cybersecurity threats as they occur
CA Technologies to Acquire Xceedium and Provide Comprehensive Offering for Combating Privileged User Security Breaches and Compliance Risks
Products and Releases  |  8/10/2015  | 
Acquisition of Privileged Identity Management ‘Trailblazer’ Will Expand Customer Options for Securing IT Administrator Accounts Across Hybrid IT Environments
Survey: API Security Becoming A CXO Level Concern
Products and Releases  |  8/10/2015  | 
Akana 2015 Security Survey Reveals API Security Gaining Priority But Points to Disparities in Implementation and Maturity
Check Point Discovers Massive Vulnerability in Android Devices
Products and Releases  |  8/10/2015  | 
Vulnerability Leaves Hundreds of Millions of Devices at Risk
NSS Labs tests reveal shake-ups in fast-growing Breach Detection System market
Products and Releases  |  8/4/2015  | 
Five of Eight Leading Vendors Receive Coveted NSS "Recommended" Rating


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file