Press Releases
| Jan 25, 2013 |
QualiTest Group and Beyond Security announce an end-to-end service suite to include security test automation services and advanced application security testing tools. QualiTest Group, the world's second largest pure play software testing and QA company, and Beyond Security, a world leading developer of security testing tools, joined forces to provide an end-to-end combined tools-services solution in the software security testing fields. |
| Mar 24, 2010 |
Transition Systems Appointed Exclusive Singapore Distributor for Beyond Security's Vulnerability Assessment Products Transition Systems announces its appointment as exclusive distributor of Beyond Security products in Singapore. Beyond Security recognizes the importance of having a local partner in this vibrant and growing market. Transition is chosen after an extensive search as it provides the greatest breadth of experience and best customer support. |
| Feb 1, 2010 |
Torrid Networks and Beyond Security Partner to Launch Best-of-Breed Information Security Products in India Beyond Secucrity and Torrid Networks have agreed to deliver Vulnerability Assessment and Management solutions into India. Mohan Navalgund is announced as Director in India. |
| Nov 12, 2009 |
Aviram Jenik To Speak at India's Largest Security Conference Aviram will make presentations on 'How to Blackbox Test Almost Anything' and 'Testing JSON Applications for Security Holes'. Additionally Beyond Security will be co-sponsoring the Leadership Summit 2009, an elite gathering of 200 technology leaders, decision makers & InfoSec experts from leading service providers, government agencies and various industry verticals. |
| Apr 14, 2009 |
Beyond Security Called In By Government To Defend Banking Systems Major powers use web-based attacks against vital targets to cause financial and social damage without firing a shot. |
| Jan 19, 2009 |
Netstar Networks Secures Corporate Networks With Beyond Security's Vulnerability Scanning Service - AVDS "After a significant evaluation of several vendors in the vulnerability scanning space, we chose Beyond Security as our partner." |
| Sep 1, 2008 |
ion-ip to offer Beyond Security's VA solutions in the Netherlands Solution will enable organizations to continuously monitor for known and unknown security holes in servers and audit vendor products for security holes. |
| June 30, 2008 |
beSTORM the first security testing tool to introduce RMI fuzzing The ability to test Remote Method Invocation a powerful addition to the fuzzing platform. |
| Nov 13, 2007 |
Beyond Security Finalist for the Red Herring 100 Global Awards 2007 The Most Promising Private Technology Ventures in the World to be Celebrated at Event in Seattle, Washington. |
| April 17, 2007 |
Beyond Security CTO's keynote in Malware 2007. Noam Rathaus, Beyond Security's CTO delivered the keynote speech in the IEEE Malware 2007 conference in New Orleans. The talk, titled Automatic Vulnerability Assessment in the Year 2013 Myth or Reality described a futuristic scenario in which malware becomes a billion dollars market segment and is operated like a commercial business with R&D, Marketing and Sales. The presentation can be viewed here. |
| Sep 12, 2006 |
Beyond Security Introduces 80/20 Rule for 'Smart' Blackbox Testing in New Version of beSTORM. Top Security Vulnerabilities Revealed in Hours Making Automated Blackbox Testing Practical for IP Devices and Embedded Systems. |
| June 20, 2006 |
Lucent Technologies and Beyond Security Launch Automated Vulnerability Detection Service for Japan Market. Companies to provide security assessment services to government, enterprise and service provider customers. |
| March 28, 2006 |
Beyond Security Launches Security Analysis Solution That Changes The Face Of Vulnerability Assessment. beSTORM Tests Billions of Attack Combinations to Save Millions in Unrecoverable Costs. |
| March 8, 2006 |
Curbing Security Issues in Software Applications Becomes Focus for Developers. Beyond Security Readies New Tool to Plug Security Holes Before Product Hits the Street. |
| June 14, 2005 |
Lucent Technologies Announces Agreement with Beyond Security to Provide Automated Security Services. Lucent Worldwide Services (LWS) Announces Pact with Beyond Security to Provide Automated Network Vulnerability Scanning Services to Service Provider Customers Worldwide. |
| Feb 15, 2005 |
Leading Ecommerce Websites Vulnerable to a Security Breach in Randomly Generated Session IDs. Leading Ecommerce Websites Vulnerable to a Security Breach in Randomly Generated Session IDs Zvi Gutterman and Dahlia Malkhi from the Hebrew University in Jerusalem, in cooperation with Beyond Security. have discovered a breach in the random generation of session IDs which can enable hackers to steal personal information and make purchases from leading ecommerce and financial services websites. Gutterman will be presenting his findings at the RSA Conference in San Francisco this Tuesday, February 15, 2005. |
| Oct 19, 2004 |
Rayovac's IT Team Discusses Network Security, Sarbanes Oxley And ROI Myths. By Ben Bradley |
| Mar 10, 2004 | Beyond Security Announces the first integrated Network Web Application Vulnerability Scanner. This consolidates 2 categories considered separate in the security market |
Featured Coverage
| September 25, 2008 | |
![]() |
Un nuevo 'spam' se aprovecha de los vanidosos Los spammers han descubierto un nuevo truco para que la gente lea basura en la web: aprovecharse de su vanidad. Crean un sitio con el nombre de una persona y, cuando ésta acude a ver qué se dice de ella, topa con una página llena de anuncios. Es el vanity spam. |
| September 2, 2008 | |
![]() |
Samenwerking ion-ip en Beyond Security Netwerkprovider ion-ip gaat de Vulnerability Assessment en Managementoplossingen van Beyond Security aanbieden. |
| July 17, 2008 | |
![]() |
GMail Name Disclosure In Google Calendar Other users are not normally supposed to be able to get the first and last names with which you registered a Google E-mail address, but they can. The SecuriTeam Blog shows that Google Calendar exposes it. |
| July 16, 2008 | |
![]() |
Gmail Privacy Hole Shows User Names Sharing a Google Calendar with another Gmail user can expose the first name and last name that the recipient of the shared calendar supplied to set up a Gmail account. |
| Jun 08, 2007 | |
![]() |
Could the U.S. repel a cyberattack? Oakland and Washington - Evidence is mounting that cyberwarfare tactics are part of the 21st-century arsenals of powers like Russia and China, yet the United States has not made Internet defenses a major priority. |
| Jun 06, 2007 | |
![]() |
Rundajad tunnevad end karistamatult Eesti-vastaste kuberrunnete tegelikke korraldajaid on raske voi isegi voimatu tabada, todeb Iisraeli arvutiturvaekspert Gadi Evron |
| May 30, 2007 | |
![]() |
Researcher: Don't trust toolbars for Firefox Makers of some of the most popular extension software used by the Firefox browser are not doing enough to secure their software, a security researcher said Wednesday. |
| Feb 12, 2007 | |
![]() |
Sicurezza: due bug non corretti per Firefox La funzione di blocco dei pop-up e il filtro antiphishing non sarebbero cosi sicuri come sembra. Ma, tutto sommato, noneè un pericolo gra |
![]() |
Phishers slip through Firefox security net. Extra backslash allows for bypass of filter. |
![]() |
|
| Feb 9, 2007 | |
![]() |
Fuzzing - It Can Be Good for Finding Evil Hackers make finding security holes look easy. A new product comes out, and not a week goes by before hackers expose embarrassing, sometimes trivial, security weaknesses in the product. Sometimes it's as if hackers can find those vulnerabilities "at will." In one case security researcher H.D. Moore announced a project he named "a month of browser bugs" where every day during July a new security-related bug was exposed in one of the leading browsers from Microsoft, Apple, and Opera. |
| Feb 8, 2007 | |
![]() |
Pop-up Blocker Problem Found in Firefox A flaw in the pop-up blocker of the open-source browser Firefox could allow an attacker to access local files, according to security analysts. |
![]() |
Two security flaws discovered in Firefox A security company has reported two new flaws in the Mozilla Firefox browser that may leave locally saved files vulnerable to outside attacks. |
| January 29, 2007 | |
![]() |
Honeynets: Trapping attackers and naming names The Web Honeynet Project, an independent group of Honeynet researchers from Securiteam and the ITOSF have decided to launch web application honeynets with a new twist. The twist is, they plan to name not only the attack details, as is usual, but also to divulge the IP addresses and other tracking information about the attackers themselves. |
| Jan 07, 2007 | |
![]() |
Attack of the Zombie Computers Is Growing Threat In their persistent quest to breach the Internet's defenses, the bad guys are honing their weapons and increasing their firepower. With growing sophistication, they are taking advantage of programs that secretly install themselves on thousands or even millions of personal computers, band these computers together into an unwitting army of zombies, and use the collective power of the dragooned network to commit Internet crimes. |
| December 26, 2006 | |
![]() |
Beyond Security Scans for Vulnerabilities Daily. Beyond Security has taken its scanning system and moved it up a notch with the release of Automated Vulnerability Detection System (AVDS). Beyond Security has a history of offering good vulnerability assessment. With this release, the company is making that data more accessible to manage vulnerabilities. |
| December 12, 2006 | |
![]() |
Beyond Security Enhances Its beSTORM Network Security Product Beyond Security, a leading provider of security assessment technologies, today announced the latest version of its security analysis solution, beSTORM 2.0. |
| November 29, 2006 | |
![]() |
Beyond Security Launches Multi-Level Scanning Tool Beyond Security recently launched a multilevel scanning solution that simulates hacker attacks to hunt down security vulnerabilities existing in all types of gear throughout the data center. |
| November 28, 2006 | |
![]() |
Beyond Security Launches Multi-Level Scanning Tool Beyond Security recently launched a multilevel scanning solution that simulates hacker attacks to hunt down security vulnerabilities existing in all types of gear throughout the data center. |
![]() |
Beyond Security Named Reader Trust Finalist in SC Magazine Award Program Beyond Security, a leading provider of security assessment technologies, has been named a finalist in SC Magazine's Award program for outstanding achievement in information-technology (IT) security. |
| November 11, 2006 | |
![]() |
Alarm Raised for Critical Broadcom Wi-Fi Driver Flaw Computer security analysts are raising the alarm for a critical vulnerability in the Broadcom wireless driver embedded in PCs from HP, Dell, Gateway and eMachines. |
| October 26, 2006 | |
![]() |
'Less than zero-day' threats too often overlooked, analysts warn Companies tend to focus only on patching known flaws, ignoring other threats |
| October 23, 2006 | |
![]() |
Software Uses Hacker Tactic To Find Security Vulnerabilities The idea behind the technique, called "fuzzing," is to take a certain request--between a Web browser and a server, for example--and modify it so that it's slightly different from what one side expects. |
| October 16, 2006 | |
![]() |
Narrowing focus on vulnerabilities A new version of the security analysis solution beSTORM 2.0 introduces the 80/20 rule for smart black-box testing. |
![]() |
Beyond Security's beStorm Speeds Up Bug Discovery In Applications Beyond Security is using a common hacker technique to help software developers and testers weed out glitches in applications that could later become the target of exploits. |
![]() |
New Technique Promises To Speed Up Bug Discovery In Applications Beyond Security is using a hacker method called "fuzzing." The idea is to take a certain request--between a Web browser and server, for example--and modify it so that it's slightly different from what one side expects. |
![]() |
Beyond Security's beStorm Speeds Up Bug Discovery In Applications Beyond Security is using a common hacker technique to help software developers and testers weed out glitches in applications that could later become the target of exploits. |
![]() |
Beyond Security's beStorm Speeds Up Bug Discovery In Applications Beyond Security is using a common hacker technique to help software developers and testers weed out glitches in applications that could later become the target of exploits. |
![]() |
Is the Botnet Battle Already Lost? "We've managed to hold back the tide, but, for the most part, it's been useless," |
| October 10, 2006 | |
![]() |
Hackers pounce on Google Code Search Security watchers from both sides of the fence have been testing Google's Code Search service to determine whether it can be misused. |
| October 9, 2006 | |
![]() |
Hackers find use for Google Code Search Google has inadvertently given online attackers a new tool. |
| June 19, 2006 | |
![]() |
Lucent Technologies and Beyond Security Launch Automated Vulnerability Detection Service for Japan Market. Companies to provide security assessment services to government, enterprise and service provider customers. |
| May 16, 2006 | |
![]() |
Beyond Security Checks for Unknown Vulnerabilities. Beyond Security recently launched a new security vulnerability assessment tool designed to scour applications for any sort of security weakness, including commonly known problems and entirely new ones. |
| May 2, 2006 | |
![]() |
beSTORM Finds Bugs During Development. A new product from Beyond Security automatically tests billions of attack combinations in network-enabled software applications to uncover unknown vulnerabilities during the development cycle, before applications are complete. |
| May 1, 2006 | |
![]() |
A new way to automate software security testing. Automated testing is old hat in some areas, but beSTORM offers a new twist: It can automatically test billions of attack combinations against any network-enabled software. |
![]() |
Predict your security future with beSTORM beSTORM arms developers, quality assurance teams and security professionals with a tool to test for security holes while still in the development phase. |
| March 28, 2006 | |
![]() |
Beyond Security Launches Security Analysis Solution That Changes the Face of Vulnerability Assessment. beSTORM Tests Billions of Attack Combinations to Save Millions in Unrecoverable Costs. |
| Feb 24, 2006 | |
![]() |
Con Akhela e Beyond Security, network a prova di hacker Akhela, azienda IT del gruppo Saras, leader nei servizi di sicurezza, ha siglato un accordo commerciale con Beyond Security. |
| Feb 13, 2006 | |
![]() |
Drag-and-drop Flaw in Internet Explorer Reported. An IE browser flaw reportedly could allow malicious code to run and cause a takeover of your PC. |
| Feb 12, 2007 | |
![]() |
The Future of Security Gets Fuzzy. Some classes of security flaws are addressable by improvements in testing tools, and the next generation of testers is around the corner. |
![]() |
Securiteam Segnala "Lacune" Negli Antivirus |
| June 13, 2005 | |
![]() |
Lucent Technologies Announces Agreement With Beyond Security to Provide Automated Security Services. According to the agreement, Lucent Worldwide Services (LWS) will actively market and sell Beyond Security's AVDS to its service provider and business partners worldwide as a new security assessment and vulnerability service. Forbes |
| Nov 15, 2004 | |
![]() |
Appliance now scans custom Web apps. The new feature complements the appliance's current abilities to scan at the database, operating system and network levels. MSN Tech & Gadgets |
| Nov 6, 2004 | |
![]() |
Beyond-IP Announces the First Integrated Network and Web Application Vulnerability Scanner. Many web sites suffer from critical security holes, allowing hackers to steal customer information, or deface the corporate web site. Onlypunjab |
| Jun 08, 2004 | |
![]() |
Beyond Security publishes an annual report on breaches in networks and browsers. Worm threatening Linux and Windows on its way. Globes |
| Mar 30, 2004 | |
![]() |
Hacker test almosts plants false report on TASE website. Beyond Security's fictitious statement: Oil was discovered at Dizengoff Center. Global Secure Systems |
| Mar 29, 2004 | |
![]() |
Beyond Security stellt den ersten integrierten Vulnerability-Scanner fur Netzwerke und Webanwendungen vor |
| Apr 21, 2003 | |
![]() |
Beyond Security finds bug in Macromedia's Flash software. Flash technology is used to view interactive "pop-up" advertisements. Globes |
| Apr 16, 2003 | |
![]() |
Beyond Security discovers bug in Macromedia Flash. Vulnerability discovered in cooperation with Japanese security company Vagabond. |
| Dec 20, 2002 | |
![]() |
Security flaw threatens Cisco Web site. A vulnerability in Cross-Site Scripting could mean trouble for both Cisco and its Web site users. ZDNet |
| Nov 10, 2002 | |
![]() |
Microsoft warns of 'critical' flaw in Outlook Express.
ITworld.com |
| Oct 30, 2002 | |
![]() |
Do Bug-Hunting Security Firms Put Users at Risk? Publicizing software flaws before reporting them to the maker could help hackers attack, some insiders say. NetworkWorldFusion. |
| Sep 30, 2002 | |
![]() |
A way to defeat e-mail virus filtering. NetworkWorldFusion. |
| Sep 20, 2002 | |
![]() |
Schwachstelle in der Software-Architektur von Microsoft. COMPUTERWOCHE |
| Sep 13, 2002 | |
![]() |
Microsoft Word, Outlook vulnerabilities identified. VULNERABILITIES have been identified in two widely-used Microsoft products, Microsoft Word and Outlook Express. |
| Sep 13, 2002 | |
![]() |
Hackers Pose Threat to Outlook Express. Serious vulnerability in Microsoft's e-mail application could allow messages to bypass virus scanners. PCWorld |
| Sep 13, 2002 | |
![]() |
Vulnerability Note VU#836088 Multiple vendors' email content/virus scanners do not adequately check "message/partial" MIME entities. |
| Sep 13, 2002 | |
![]() |
Hacking with Outlook Express. ITWEB Technology News |
| Sep 12, 2002 | |
![]() |
Outlook Express Lets Attackers Skirt Filters. eWeek enterprise news & reviews |
| Sep 21, 1999 | |
![]() |
Critical Path oversight exposes NSI email. Email hosting provider Critical Path has acknowledged a serious security hole that compromised accounts within services offered by a number of customers, including Network Solutions, the dominant domain name registrar. |