Press Releases

Press Releases

Jan 25, 2013 QualiTest Group and Beyond Security announce an end-to-end service suite to include security test automation services and advanced application security testing tools.
QualiTest Group, the world's second largest pure play software testing and QA company, and Beyond Security, a world leading developer of security testing tools, joined forces to provide an end-to-end combined tools-services solution in the software security testing fields.
Mar 24, 2010 Transition Systems Appointed Exclusive Singapore Distributor for Beyond Security's Vulnerability Assessment Products
Transition Systems announces its appointment as exclusive distributor of Beyond Security products in Singapore. Beyond Security recognizes the importance of having a local partner in this vibrant and growing market. Transition is chosen after an extensive search as it provides the greatest breadth of experience and best customer support.
Feb 1, 2010 Torrid Networks and Beyond Security Partner to Launch Best-of-Breed Information Security Products in India
Beyond Secucrity and Torrid Networks have agreed to deliver Vulnerability Assessment and Management solutions into India. Mohan Navalgund is announced as Director in India.
Nov 12, 2009 Aviram Jenik To Speak at India's Largest Security Conference
Aviram will make presentations on 'How to Blackbox Test Almost Anything' and 'Testing JSON Applications for Security Holes'. Additionally Beyond Security will be co-sponsoring the Leadership Summit 2009, an elite gathering of 200 technology leaders, decision makers & InfoSec experts from leading service providers, government agencies and various industry verticals.
Apr 14, 2009 Beyond Security Called In By Government To Defend Banking Systems
Major powers use web-based attacks against vital targets to cause financial and social damage without firing a shot.
Jan 19, 2009 Netstar Networks Secures Corporate Networks With Beyond Security's Vulnerability Scanning Service - AVDS
"After a significant evaluation of several vendors in the vulnerability scanning space, we chose Beyond Security as our partner."
Sep 1, 2008 ion-ip to offer Beyond Security's VA solutions in the Netherlands
Solution will enable organizations to continuously monitor for known and unknown security holes in servers and audit vendor products for security holes.
June 30, 2008 beSTORM the first security testing tool to introduce RMI fuzzing
The ability to test Remote Method Invocation a powerful addition to the fuzzing platform.
Nov 13, 2007 Beyond Security Finalist for the Red Herring 100 Global Awards 2007
The Most Promising Private Technology Ventures in the World to be Celebrated at Event in Seattle, Washington.
April 17, 2007 Beyond Security CTO's keynote in Malware 2007.
Noam Rathaus, Beyond Security's CTO delivered the keynote speech in the IEEE Malware 2007 conference in New Orleans. The talk, titled Automatic Vulnerability Assessment in the Year 2013 Myth or Reality described a futuristic scenario in which malware becomes a billion dollars market segment and is operated like a commercial business with R&D, Marketing and Sales. The presentation can be viewed here.
Sep 12, 2006 Beyond Security Introduces 80/20 Rule for 'Smart' Blackbox Testing in New Version of beSTORM.
Top Security Vulnerabilities Revealed in Hours Making Automated Blackbox Testing Practical for IP Devices and Embedded Systems.
June 20, 2006 Lucent Technologies and Beyond Security Launch Automated Vulnerability Detection Service for Japan Market.
Companies to provide security assessment services to government, enterprise and service provider customers.
March 28, 2006 Beyond Security Launches Security Analysis Solution That Changes The Face Of Vulnerability Assessment.
beSTORM Tests Billions of Attack Combinations to Save Millions in Unrecoverable Costs.
March 8, 2006 Curbing Security Issues in Software Applications Becomes Focus for Developers.
Beyond Security Readies New Tool to Plug Security Holes Before Product Hits the Street.
June 14, 2005 Lucent Technologies Announces Agreement with Beyond Security to Provide Automated Security Services.
Lucent Worldwide Services (LWS) Announces Pact with Beyond Security to Provide Automated Network Vulnerability Scanning Services to Service Provider Customers Worldwide.
Feb 15, 2005 Leading Ecommerce Websites Vulnerable to a Security Breach in Randomly Generated Session IDs.
Leading Ecommerce Websites Vulnerable to a Security Breach in Randomly Generated Session IDs
Zvi Gutterman and Dahlia Malkhi from the Hebrew University in Jerusalem, in cooperation with Beyond Security. have discovered a breach in the random generation of session IDs which can enable hackers to steal personal information and make purchases from leading ecommerce and financial services websites. Gutterman will be presenting his findings at the RSA Conference in San Francisco this Tuesday, February 15, 2005.
Oct 19, 2004 Rayovac's IT Team Discusses Network Security, Sarbanes Oxley And ROI Myths.
By Ben Bradley
Mar 10, 2004 Beyond Security Announces the first integrated Network Web Application Vulnerability Scanner. This consolidates 2 categories considered separate in the security market

Featured Coverage

September 25, 2008
Un nuevo 'spam' se aprovecha de los vanidosos
Los spammers han descubierto un nuevo truco para que la gente lea basura en la web: aprovecharse de su vanidad. Crean un sitio con el nombre de una persona y, cuando ésta acude a ver qué se dice de ella, topa con una página llena de anuncios. Es el vanity spam.
September 2, 2008
Samenwerking ion-ip en Beyond Security
Netwerkprovider ion-ip gaat de Vulnerability Assessment en Managementoplossingen van Beyond Security aanbieden.
July 17, 2008
GMail Name Disclosure In Google Calendar
Other users are not normally supposed to be able to get the first and last names with which you registered a Google E-mail address, but they can. The SecuriTeam Blog shows that Google Calendar exposes it.
July 16, 2008
Gmail Privacy Hole Shows User Names
Sharing a Google Calendar with another Gmail user can expose the first name and last name that the recipient of the shared calendar supplied to set up a Gmail account.
Jun 08, 2007
Could the U.S. repel a cyberattack?
Oakland and Washington - Evidence is mounting that cyberwarfare tactics are part of the 21st-century arsenals of powers like Russia and China, yet the United States has not made Internet defenses a major priority.
Jun 06, 2007
Rundajad tunnevad end karistamatult
Eesti-vastaste kuberrunnete tegelikke korraldajaid on raske voi isegi voimatu tabada, todeb Iisraeli arvutiturvaekspert Gadi Evron
May 30, 2007
Researcher: Don't trust toolbars for Firefox
Makers of some of the most popular extension software used by the Firefox browser are not doing enough to secure their software, a security researcher said Wednesday.
Feb 12, 2007
Sicurezza: due bug non corretti per Firefox
La funzione di blocco dei pop-up e il filtro antiphishing non sarebbero cosi sicuri come sembra. Ma, tutto sommato, noneè un pericolo gra
Phishers slip through Firefox security net.
Extra backslash allows for bypass of filter.

Feb 9, 2007
Fuzzing - It Can Be Good for Finding Evil
Hackers make finding security holes look easy. A new product comes out, and not a week goes by before hackers expose embarrassing, sometimes trivial, security weaknesses in the product. Sometimes it's as if hackers can find those vulnerabilities "at will." In one case security researcher H.D. Moore announced a project he named "a month of browser bugs" where every day during July a new security-related bug was exposed in one of the leading browsers from Microsoft, Apple, and Opera.
Feb 8, 2007
Pop-up Blocker Problem Found in Firefox
A flaw in the pop-up blocker of the open-source browser Firefox could allow an attacker to access local files, according to security analysts.
Two security flaws discovered in Firefox
A security company has reported two new flaws in the Mozilla Firefox browser that may leave locally saved files vulnerable to outside attacks.
January 29, 2007
Honeynets: Trapping attackers and naming names
The Web Honeynet Project, an independent group of Honeynet researchers from Securiteam and the ITOSF have decided to launch web application honeynets with a new twist. The twist is, they plan to name not only the attack details, as is usual, but also to divulge the IP addresses and other tracking information about the attackers themselves.
Jan 07, 2007
Attack of the Zombie Computers Is Growing Threat
In their persistent quest to breach the Internet's defenses, the bad guys are honing their weapons and increasing their firepower. With growing sophistication, they are taking advantage of programs that secretly install themselves on thousands or even millions of personal computers, band these computers together into an unwitting army of zombies, and use the collective power of the dragooned network to commit Internet crimes.
December 26, 2006
Beyond Security Scans for Vulnerabilities Daily.
Beyond Security has taken its scanning system and moved it up a notch with the release of Automated Vulnerability Detection System (AVDS). Beyond Security has a history of offering good vulnerability assessment. With this release, the company is making that data more accessible to manage vulnerabilities.
December 12, 2006
Beyond Security Enhances Its beSTORM Network Security Product
Beyond Security, a leading provider of security assessment technologies, today announced the latest version of its security analysis solution, beSTORM 2.0.
November 29, 2006
Beyond Security Launches Multi-Level Scanning Tool
Beyond Security recently launched a multilevel scanning solution that simulates hacker attacks to hunt down security vulnerabilities existing in all types of gear throughout the data center.
November 28, 2006
Beyond Security Launches Multi-Level Scanning Tool
Beyond Security recently launched a multilevel scanning solution that simulates hacker attacks to hunt down security vulnerabilities existing in all types of gear throughout the data center.
Beyond Security Named Reader Trust Finalist in SC Magazine Award Program
Beyond Security, a leading provider of security assessment technologies, has been named a finalist in SC Magazine's Award program for outstanding achievement in information-technology (IT) security.
November 11, 2006
Alarm Raised for Critical Broadcom Wi-Fi Driver Flaw
Computer security analysts are raising the alarm for a critical vulnerability in the Broadcom wireless driver embedded in PCs from HP, Dell, Gateway and eMachines.
October 26, 2006
'Less than zero-day' threats too often overlooked, analysts warn
Companies tend to focus only on patching known flaws, ignoring other threats
October 23, 2006
Software Uses Hacker Tactic To Find Security Vulnerabilities
The idea behind the technique, called "fuzzing," is to take a certain request--between a Web browser and a server, for example--and modify it so that it's slightly different from what one side expects.
October 16, 2006
Narrowing focus on vulnerabilities
A new version of the security analysis solution beSTORM 2.0 introduces the 80/20 rule for smart black-box testing.
Beyond Security's beStorm Speeds Up Bug Discovery In Applications
Beyond Security is using a common hacker technique to help software developers and testers weed out glitches in applications that could later become the target of exploits.
New Technique Promises To Speed Up Bug Discovery In Applications
Beyond Security is using a hacker method called "fuzzing." The idea is to take a certain request--between a Web browser and server, for example--and modify it so that it's slightly different from what one side expects.
Beyond Security's beStorm Speeds Up Bug Discovery In Applications
Beyond Security is using a common hacker technique to help software developers and testers weed out glitches in applications that could later become the target of exploits.
Beyond Security's beStorm Speeds Up Bug Discovery In Applications
Beyond Security is using a common hacker technique to help software developers and testers weed out glitches in applications that could later become the target of exploits.
Is the Botnet Battle Already Lost?
"We've managed to hold back the tide, but, for the most part, it's been useless,"
October 10, 2006
Hackers pounce on Google Code Search
Security watchers from both sides of the fence have been testing Google's Code Search service to determine whether it can be misused.
October 9, 2006
Hackers find use for Google Code Search
Google has inadvertently given online attackers a new tool.
June 19, 2006
Lucent Technologies and Beyond Security Launch Automated Vulnerability Detection Service for Japan Market.
Companies to provide security assessment services to government, enterprise and service provider customers.
May 16, 2006
Beyond Security Checks for Unknown Vulnerabilities.
Beyond Security recently launched a new security vulnerability assessment tool designed to scour applications for any sort of security weakness, including commonly known problems and entirely new ones.
May 2, 2006
beSTORM Finds Bugs During Development.
A new product from Beyond Security automatically tests billions of attack combinations in network-enabled software applications to uncover unknown vulnerabilities during the development cycle, before applications are complete.
May 1, 2006
A new way to automate software security testing.
Automated testing is old hat in some areas, but beSTORM offers a new twist: It can automatically test billions of attack combinations against any network-enabled software.
Predict your security future with beSTORM
beSTORM arms developers, quality assurance teams and security professionals with a tool to test for security holes while still in the development phase.
March 28, 2006
Beyond Security Launches Security Analysis Solution That Changes the Face of Vulnerability Assessment.
beSTORM Tests Billions of Attack Combinations to Save Millions in Unrecoverable Costs.
Feb 24, 2006
Con Akhela e Beyond Security, network a prova di hacker
Akhela, azienda IT del gruppo Saras, leader nei servizi di sicurezza, ha siglato un accordo commerciale con Beyond Security.
Feb 13, 2006
Drag-and-drop Flaw in Internet Explorer Reported.
An IE browser flaw reportedly could allow malicious code to run and cause a takeover of your PC.
Feb 12, 2007
The Future of Security Gets Fuzzy.
Some classes of security flaws are addressable by improvements in testing tools, and the next generation of testers is around the corner.
Securiteam Segnala "Lacune" Negli Antivirus
June 13, 2005
Lucent Technologies Announces Agreement With Beyond Security to Provide Automated Security Services.
According to the agreement, Lucent Worldwide Services (LWS) will actively market and sell Beyond Security's AVDS to its service provider and business partners worldwide as a new security assessment and vulnerability service. Forbes
Nov 15, 2004
Appliance now scans custom Web apps.
The new feature complements the appliance's current abilities to scan at the database, operating system and network levels. MSN Tech & Gadgets
Nov 6, 2004
Beyond-IP Announces the First Integrated Network and Web Application Vulnerability Scanner. Many web sites suffer from critical security holes, allowing hackers to steal customer information, or deface the corporate web site. Onlypunjab
Jun 08, 2004
Beyond Security publishes an annual report on breaches in networks and browsers.
Worm threatening Linux and Windows on its way. Globes
Mar 30, 2004
Hacker test almosts plants false report on TASE website.
Beyond Security's fictitious statement: Oil was discovered at Dizengoff Center. Global Secure Systems
Mar 29, 2004
Beyond Security stellt den ersten integrierten Vulnerability-Scanner fur Netzwerke und Webanwendungen vor
Apr 21, 2003
Beyond Security finds bug in Macromedia's Flash software.
Flash technology is used to view interactive "pop-up" advertisements. Globes
Apr 16, 2003
Beyond Security discovers bug in Macromedia Flash.
Vulnerability discovered in cooperation with Japanese security company Vagabond.
Dec 20, 2002
Security flaw threatens Cisco Web site.
A vulnerability in Cross-Site Scripting could mean trouble for both Cisco and its Web site users. ZDNet
Nov 10, 2002
Microsoft warns of 'critical' flaw in Outlook Express.
ITworld.com
Oct 30, 2002
Do Bug-Hunting Security Firms Put Users at Risk?
Publicizing software flaws before reporting them to the maker could help hackers attack, some insiders say. NetworkWorldFusion.
Sep 30, 2002
A way to defeat e-mail virus filtering.
NetworkWorldFusion.
Sep 20, 2002
Schwachstelle in der Software-Architektur von Microsoft.
COMPUTERWOCHE
Sep 13, 2002
Microsoft Word, Outlook vulnerabilities identified.
VULNERABILITIES have been identified in two widely-used Microsoft products, Microsoft Word and Outlook Express.
Sep 13, 2002
Hackers Pose Threat to Outlook Express.
Serious vulnerability in Microsoft's e-mail application could allow messages to bypass virus scanners. PCWorld
Sep 13, 2002
Vulnerability Note VU#836088
Multiple vendors' email content/virus scanners do not adequately check "message/partial" MIME entities.
Sep 13, 2002
Hacking with Outlook Express.
ITWEB Technology News
Sep 12, 2002
Outlook Express Lets Attackers Skirt Filters.
eWeek enterprise news & reviews
Sep 21, 1999
Critical Path oversight exposes NSI email.
Email hosting provider Critical Path has acknowledged a serious security hole that compromised accounts within services offered by a number of customers, including Network Solutions, the dominant domain name registrar.

Mehr Informationen

Beyond Security

ist ein zugelassener Scanning-Anbieter für die Payment Card Industry (PCI).

Testen von Webanwendungen

Entdecken Sie Sicherheitsprobleme im Zusammenhang mit Webanwendungen, Websites und den zugehörigen Anlagen und Datenbanken.