Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in August 2019
McAfee Report Uncovers Ransomware Resurgence
Products and Releases  |  8/29/2019  | 
McAfee Labs sees 504 new threats per minute in Q1 2019; data breaches facilitate attacks on large organizations; majority of targeted attacks bet on victims' unwitting compliance.
Business Losses to Cybercrime Data Breaches to Exceed $5 trillion by 2024
Products and Releases  |  8/28/2019  | 
Cybersecurity Breaches to Increase Nearly 70% Over the Next 5 years
Survey: SMBs Continue to Struggle with IT Security
Products and Releases  |  8/27/2019  | 
SMBs cite budget constraints, paired with a lack of time and personnel to research new security threats, among the reasons.
Space ISAC and National Cybersecurity Center Announce MITRE Will Be an ISAC Founding Member
Products and Releases  |  8/26/2019  | 
New Information Sharing and Analysis Center Adds New Founding Member to Board
Cyberbit & Purdue Partner to Advance Cybersecurity Workforce Education & Training
Products and Releases  |  8/23/2019  | 
Cyberbit's cyberattack simulation platform will be used to enhance the skills of career professionals.
Federal Grand Jury Indicts 80 Defendants in International BEC Scams
Products and Releases  |  8/22/2019  | 
Defendants are charged with various online frauds including business email compromise, money laundering, romance scams, and schemes targeting the elderly.
Veracode Releases Advanced Software Composition Analysis Solution Decreasing Open Source Risk
Products and Releases  |  8/22/2019  | 
Cloud-based solution helps developers prioritize and remediate open source vulnerabilities quickly within DevSecOps environments.
Remediant Secures $15 Million in Series A Funding Round Co-led By Dell Technologies Capital and ForgePoint Capital
Products and Releases  |  8/22/2019  | 
Remediants SecureONE solution addresses major industry need for more effective Privileged Access Management
JASK Integrates with Cisco Security Portfolio, Joins Cisco Security Technical Alliance
Products and Releases  |  8/21/2019  | 
JASKs cloud-native SIEM now integrates with Cisco ASA, Umbrella and AMP4EP.
Morphisec Announces 2019 Women in Cybersecurity Scholarship Winners
Products and Releases  |  8/20/2019  | 
Scholarships Awarded to Three Female Students to Encourage Young Women Poised To Enter The Cybersecurity Field Globally
OwnBackup Appoints Adrian Kunzle as Head of Product & Strategy
Products and Releases  |  8/20/2019  | 
Cloud-to-cloud backup innovator adds Salesforce veteran.
ZeroFOX Launches Election Protection Package
Products and Releases  |  8/20/2019  | 
AI-powered solution provides continuous protection across digital and social media channels; safeguards candidates, campaigns, and political organizations from threats targeting elections and election-related activities
Global Cyber Alliance Launches Cybersecurity Development Platform for Internet of Things (IoT) Devices
Products and Releases  |  8/19/2019  | 
New AIDE Platform Enables IoT Device Manufacturers to Test Security, Identify and Mitigate Global Attack Risks, and Identify Vulnerabilities
Deloitte and Splunk Provide Automated Security Monitoring and Response Capabilities to Organizations Worldwide
Products and Releases  |  8/19/2019  | 
Capability is designed to enable clients to more effectively detect, defend and respond to critical cyber threats
Microsoft, Imprivata Launch Cloud Access Security Tool for Healthcare
Products and Releases  |  8/15/2019  | 
Imprivata Identity Governance enables customers to manage the provisioning, tracking, and deprovisioning of users in hybrid on-premises and cloud environments.
70% of Financial Companies Suffered a Cybersecurity Incident in the Past 12 Months
Products and Releases  |  8/15/2019  | 
Nearly half originated from employees failing to follow security protocol or data protection policies, according to Clearswift.
Code42's Data Loss Detection and Response Capabilities Spot Data Theft When Employees Quit
Products and Releases  |  8/15/2019  | 
Integrates with IBM Resilient to speed incident response to data loss, leak, and theft.
New Cyber Research Records a 91% Reduction in Dwell Time for Users of Deception Technology
Products and Releases  |  8/15/2019  | 
70% of Users Highly Familiar with Deception Technology Report a High Confidence for Detecting In-Network Threat
McAfee to Acquire NanoSec to Enhance Capabilities in Cloud Security
Products and Releases  |  8/9/2019  | 
NanoSec's multi-cloud, zero-trust application visibility and security platform further extend McAfee's cloud access security broker (CASB) and cloud workload protection platform (CWPP) capabilities.
ZeroFOX Expands AI Capabilities to Detect Deepfakes
Products and Releases  |  8/8/2019  | 
New video analysis features analyze content and identify risks.
Capsule8 Adds Significant Funding from Intel Capital
Products and Releases  |  8/7/2019  | 
Strategic investment to fuel expansion of Capsule8's go-to-market efforts.
Censys To Unveil Attack Surface Visibility Platform at Black Hat
Products and Releases  |  8/7/2019  | 
Enterprise-level attack surface management software platform provides automatic attack surface monitoring and real-time alerts.
QOMPLX Launches Identity Assurance 2.1 For Active Directory Monitoring And Security
Products and Releases  |  8/6/2019  | 
Module can quickly detect a Kerberos-based attack.
SiteLock Announces Solution to Automatically Remove Malware & Spam from Website Databases
Products and Releases  |  8/6/2019  | 
New enhancements to SMART Database extend support across WordPress, Joomla!, and any other web application that uses a MySQL database.
Bugcrowd Announces Platform-Enabled Cybersecurity Assessments for Marketplaces
Products and Releases  |  8/6/2019  | 
Bugcrowd for Secure Marketplaces enables bulk adoption of crowdsourced security for marketplace and app store owners.
Bugcrowd Establishes Standard for Crowdsourced Security Workflow Management
Products and Releases  |  8/6/2019  | 
New standardized workflows, advanced reporting, and enhanced skills matching help operationalize true security intelligence.
CrowdStrike Introduces CrowdScore Real-Time Threat-Monitoring Metric
Products and Releases  |  8/6/2019  | 
Score helps security leaders understand the real-time state of the threat inside their organizations.
Arctic Wolf Introduces Arctic Wolf Agent for Endpoint Protection
Products and Releases  |  8/6/2019  | 
Tool provides telemetry to understand the status of endpoints including asset information, operational metrics, and key behavioral insight from vulnerability scans.
Irdeto Unveils Mobile App Protection Service
Products and Releases  |  8/5/2019  | 
Zero-touch mobile app protection service with machine learning empowers developers to focus on time-to-market and business logic.
Evolve Security Opens NSA'S GenCyber Cypersecurity Camp for Girl Scouts
Products and Releases  |  8/5/2019  | 
National Security Agency's program introduces girls to cybersecurity.
Digital Guardian Releases Free Forensic Tool
Products and Releases  |  8/5/2019  | 
DG Wingman can instantly extract key forensic artifacts, such as the Master File Table ($MFT), Windows registry, and Windows event logs for further analysis.
Everbridge Announces Acquisition of NC4
Products and Releases  |  8/2/2019  | 
Acquisition creates the industry's only end-to-end critical event management and threat assessment platform to keep people safe and business operations running.
FireEye Expands Cloud Server Protection and Investigation Capabilities
Products and Releases  |  8/1/2019  | 
New versions of FireEye Network and Endpoint Security work together to enhance detection and investigation capabilities, protecting cloud, on-premise, and hybrid deployments against emerging attacks
Capsule8 Announces New Investigations Capability for Securing Linux Production Networks
Products and Releases  |  8/1/2019  | 
Capsule8 Protect now solves production securitys data warehousing problem
Zerto Research Highlights Business Need for IT Resilience Planning
Products and Releases  |  8/1/2019  | 
Perception gap among IT and business decision makers contributing to lack of IT Resilience maturity.

How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-16
A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.
PUBLISHED: 2019-10-16
A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system.
PUBLISHED: 2019-10-16
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can clear the router's log file via act=clear&logtype=sysact to log_clear.php, which could be used to erase attack traces.
PUBLISHED: 2019-10-16
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to execute code with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating as the re...
PUBLISHED: 2019-10-16
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient...