Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in September 2016
FireMon Welcomes New President & CEO, Satin H. Mirchandani
Products and Releases  |  9/30/2016  | 
Security management vendor forges ahead with new CEO at the helm
ISAO Standards Organization To Release Initial Voluntary Guidelines For ISAOs
Products and Releases  |  9/30/2016  | 
ISAO documents in response to Executive Order 13691 available Friday, September 30 on ISAO.org
Trustwave Unveils Federated Global Security Operations
Products and Releases  |  9/29/2016  | 
Global Network of Federated, Advanced Security Operations Centers powered by Trustwave Ushers in the Next Generation of Cybersecurity Protection
Lenovo, Intel, Paypal And Synaptics Announce Collaboration To Bring Fido Authentication To Laptops
Products and Releases  |  9/22/2016  | 
ENOVO, INTEL, PAYPAL AND SYNAPTICS REVEAL COLLABORATION TO BRING A SIMPLE AND SAFE ONLINE AUTHENTICATION TO PCS WITH THE INDUSTRY’S FIRST FIDO-ENABLED EMBEDDED FINGERPRINT SOLUTION.
White Ops Increases Market Momentum with $20 Million Series B
Products and Releases  |  9/19/2016  | 
Funding from Paladin Capital Group and Grotech Ventures Will Accelerate Innovation and Expand Sales and Marketing Footprint
Symantec Endpoint Protection Cloud Secures SMBs Against Growing Threats
Products and Releases  |  9/17/2016  | 
65 Percent of Targeted Attacks are Launched Against Small and Mid-sized Businesses to Steal Confidential Customer Information for Financial Gain.
Trusona Releases Cloud Identity Suite and Launches the #NoPasswords Revolution
Products and Releases  |  9/17/2016  | 
Trusona Essential is Free and Designed to Eliminate Passwords to Create a Safer Internet
Introducing A New Secure Memory Stick
Products and Releases  |  9/16/2016  | 
Centrify’s Survey Finds Consumers More Concerned with Financial Data Getting Hacked than Private Information about Their Families Being Exposed
Products and Releases  |  9/16/2016  | 
Survey also reveals consumers more likely to hear about data breaches from the news or social media—not from companies holding their data.
Optiv Security Launches Technology-Enabled Third-Party Risk Managed Service
Products and Releases  |  9/16/2016  | 
Enables Companies to Better Manage Entire Vendor, Supplier and Business Associate Risk Management Lifecycles, Improving Compliance and Risk Management
IoT Village at DEF CON 24 Uncovers Extensive Security Flaws in Connected Devices
Products and Releases  |  9/16/2016  | 
Researchers Discover 47 New Security Vulnerabilities across 23 Devices and 21 Manufacturers; Executive Leadership from FTC and FCC Weigh in.
New report: 12 hot markets for cybersecurity jobs
Products and Releases  |  9/16/2016  | 
Randstad Technologies Announces 12 Markets with High Demand for Cybersecurity Talent
Bay Dynamics Announces Major Enhancements to Flagship Cyber Risk Analytics Platform
Products and Releases  |  9/16/2016  | 
New Version of Risk Fabric® Prioritizes Threats and Vulnerabilities, Deputizes Line-of-Business Leaders and Automates Cyber Risk Management
Vectra Networks Takes On Backdoors in Data Center Firewalls Planted by Advanced Adversaries
Products and Releases  |  9/15/2016  | 
These attack vectors are aimed at blind spots in all network and server infrastructure
HPE Aruba Introduces Developer-Ready Mobile First Platform to Unlock the Potential of Modern IT Infrastructures
Products and Releases  |  9/13/2016  | 
Aruba Mobile First Platform Provides Real-Time Insights to Improve User Experiences and IoT Security; New Partner Ready for Networking Program Expands Revenue Opportunities for the Channel
Anomali and Department of Homeland Security Collaboration Enables Groundbreaking Automated Public/Private Sector Cybersecurity Information Sharing
Products and Releases  |  9/12/2016  | 
Automated, Anonymized Public/Private Threat Intelligence Sharing Enables More Effective Protection of National Critical Infrastructure and Attacks Against U.S. Organizations
iovation Acquires LaunchKey, Combines Global Fraud Intelligence and Transparent Authentication with Dynamic Multifactor Authentication
Products and Releases  |  9/7/2016  | 
Branded for the business, the combined solution gives organizations a path to the future of authentication, while giving their customers more trust and confidence than ever before


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.