Press Releases

Press Releases

Sep 30, 2016 Hamid Karimi Joins Beyond Security Management Team.
Global VP of business development and OEM will focus on building the technology partnerships and accelerating Beyond Security’s innovation and leadership in the Network Vulnerability Assessment as well as Software and Web Application Security Testing Markets
Sep 25, 2015 Beyond Security Sponsors CodeBlue and Adds a Hacker Challenge to the Schedule.
Beyond Security is offering something new at CodeBlue. We will be bringing 11 devices to the conference premises and allowing attendees to try their skills at hacking them. The goal of the event is to find who is able to gain the highest privileges on any of these widely available and used devices.
Sep 4, 2015 Beyond Security’s beSTORM® receives recognition as Communication Robustness Testing tool for use in the ISASecure® cybersecurity certification program.
Industrial Control Systems have become hacking targets for nation-states, political groups and individuals bent on ransom or revenge. This includes chemical and refining facilities, power generation and distribution systems, transportation and of course manufacturing plants. Testing of the controllers and actuators (and robots) involved in these processes to ensure they are secure is vital.
Apr 3, 2013 Fine Tec and Beyond Security: Filling the Security Gap Most Likely to Cause Data Loss
Network security is now being discussed in board rooms, government agencies and even the White House. Everyone agrees that security is vital to corporate and even national interests and more money is being made available, but what can be done with these new funds that will really make a difference?
Jan 25, 2013 QualiTest Group and Beyond Security announce an end-to-end service suite to include security test automation services and advanced application security testing tools.
QualiTest Group, the world's second largest pure play software testing and QA company, and Beyond Security, a world leading developer of security testing tools, joined forces to provide an end-to-end combined tools-services solution in the software security testing fields.
Feb 1, 2010 Torrid Networks and Beyond Security Partner to Launch Best-of-Breed Information Security Products in India
Beyond Secucrity and Torrid Networks have agreed to deliver Vulnerability Assessment and Management solutions into India. Mohan Navalgund is announced as Director in India.
Nov 12, 2009 Aviram Jenik To Speak at India's Largest Security Conference
Aviram will make presentations on 'How to Blackbox Test Almost Anything' and 'Testing JSON Applications for Security Holes'. Additionally Beyond Security will be co-sponsoring the Leadership Summit 2009, an elite gathering of 200 technology leaders, decision makers & InfoSec experts from leading service providers, government agencies and various industry verticals.
Apr 14, 2009 Beyond Security Called In By Government To Defend Banking Systems
Major powers use web-based attacks against vital targets to cause financial and social damage without firing a shot.
Jan 19, 2009 Netstar Networks Secures Corporate Networks With Beyond Security's Vulnerability Scanning Service - AVDS
"After a significant evaluation of several vendors in the vulnerability scanning space, we chose Beyond Security as our partner."
Sep 1, 2008 ion-ip to offer Beyond Security's VA solutions in the Netherlands
Solution will enable organizations to continuously monitor for known and unknown security holes in servers and audit vendor products for security holes.
Jun 30, 2008 beSTORM the first security testing tool to introduce RMI fuzzing
The ability to test Remote Method Invocation a powerful addition to the fuzzing platform.
Nov 13, 2007 Beyond Security Finalist for the Red Herring 100 Global Awards 2007
The Most Promising Private Technology Ventures in the World to be Celebrated at Event in Seattle, Washington.
Apr 17, 2007 Beyond Security CTO's keynote in Malware 2007.
Noam Rathaus, Beyond Security's CTO delivered the keynote speech in the IEEE Malware 2007 conference in New Orleans. The talk, titled Automatic Vulnerability Assessment in the Year 2013 Myth or Reality described a futuristic scenario in which malware becomes a billion dollars market segment and is operated like a commercial business with R&D, Marketing and Sales. The presentation can be viewed here.
Sep 12, 2006 Beyond Security Introduces 80/20 Rule for 'Smart' Blackbox Testing in New Version of beSTORM.
Top Security Vulnerabilities Revealed in Hours Making Automated Blackbox Testing Practical for IP Devices and Embedded Systems.
Jun 20, 2006 Lucent Technologies and Beyond Security Launch Automated Vulnerability Detection Service for Japan Market.
Companies to provide security assessment services to government, enterprise and service provider customers.
Mar 28, 2006 Beyond Security Launches Security Analysis Solution That Changes The Face Of Vulnerability Assessment.
beSTORM Tests Billions of Attack Combinations to Save Millions in Unrecoverable Costs.
Mar 8, 2006 Curbing Security Issues in Software Applications Becomes Focus for Developers.
Beyond Security Readies New Tool to Plug Security Holes Before Product Hits the Street.
Jun 14, 2005 Lucent Technologies Announces Agreement with Beyond Security to Provide Automated Security Services.
Lucent Worldwide Services (LWS) Announces Pact with Beyond Security to Provide Automated Network Vulnerability Scanning Services to Service Provider Customers Worldwide.
Feb 15, 2005 Leading Ecommerce Websites Vulnerable to a Security Breach in Randomly Generated Session IDs.
Leading Ecommerce Websites Vulnerable to a Security Breach in Randomly Generated Session IDs
Zvi Gutterman and Dahlia Malkhi from the Hebrew University in Jerusalem, in cooperation with Beyond Security. have discovered a breach in the random generation of session IDs which can enable hackers to steal personal information and make purchases from leading ecommerce and financial services websites. Gutterman will be presenting his findings at the RSA Conference in San Francisco this Tuesday, February 15, 2005.
Oct 19, 2004 Rayovac's IT Team Discusses Network Security, Sarbanes Oxley And ROI Myths.
By Ben Bradley
Mar 10, 2004 Beyond Security Announces the first integrated Network Web Application Vulnerability Scanner. This consolidates 2 categories considered separate in the security market

Featured Coverage

September 25, 2008
Un nuevo 'spam' se aprovecha de los vanidosos
Los spammers han descubierto un nuevo truco para que la gente lea basura en la web: aprovecharse de su vanidad. Crean un sitio con el nombre de una persona y, cuando ésta acude a ver qué se dice de ella, topa con una página llena de anuncios. Es el vanity spam.
July 17, 2008
GMail Name Disclosure In Google Calendar
Other users are not normally supposed to be able to get the first and last names with which you registered a Google E-mail address, but they can. The SecuriTeam Blog shows that Google Calendar exposes it.
July 16, 2008
Gmail Privacy Hole Shows User Names
Sharing a Google Calendar with another Gmail user can expose the first name and last name that the recipient of the shared calendar supplied to set up a Gmail account.
Jun 08, 2007
Could the U.S. repel a cyberattack?
Oakland and Washington - Evidence is mounting that cyberwarfare tactics are part of the 21st-century arsenals of powers like Russia and China, yet the United States has not made Internet defenses a major priority.
Feb 9, 2007
Fuzzing - It Can Be Good for Finding Evil
Hackers make finding security holes look easy. A new product comes out, and not a week goes by before hackers expose embarrassing, sometimes trivial, security weaknesses in the product. Sometimes it's as if hackers can find those vulnerabilities "at will." In one case security researcher H.D. Moore announced a project he named "a month of browser bugs" where every day during July a new security-related bug was exposed in one of the leading browsers from Microsoft, Apple, and Opera.
Jan 07, 2007
Attack of the Zombie Computers Is Growing Threat
In their persistent quest to breach the Internet's defenses, the bad guys are honing their weapons and increasing their firepower. With growing sophistication, they are taking advantage of programs that secretly install themselves on thousands or even millions of personal computers, band these computers together into an unwitting army of zombies, and use the collective power of the dragooned network to commit Internet crimes.
November 29, 2006
Beyond Security Launches Multi-Level Scanning Tool
Beyond Security recently launched a multilevel scanning solution that simulates hacker attacks to hunt down security vulnerabilities existing in all types of gear throughout the data center.
October 16, 2006
Beyond Security's beStorm Speeds Up Bug Discovery In Applications
Beyond Security is using a common hacker technique to help software developers and testers weed out glitches in applications that could later become the target of exploits.
October 9, 2006
Hackers find use for Google Code Search
Google has inadvertently given online attackers a new tool.
May 16, 2006
Beyond Security Checks for Unknown Vulnerabilities.
Beyond Security recently launched a new security vulnerability assessment tool designed to scour applications for any sort of security weakness, including commonly known problems and entirely new ones.
May 1, 2006
Predict your security future with beSTORM
beSTORM arms developers, quality assurance teams and security professionals with a tool to test for security holes while still in the development phase.
March 28, 2006
Beyond Security Launches Security Analysis Solution That Changes the Face of Vulnerability Assessment.
beSTORM Tests Billions of Attack Combinations to Save Millions in Unrecoverable Costs.
Jun 08, 2004
Beyond Security publishes an annual report on breaches in networks and browsers.
Worm threatening Linux and Windows on its way.
Apr 21, 2003
Beyond Security finds bug in Macromedia's Flash software.
Flash technology is used to view interactive "pop-up" advertisements. Globes
Sep 13, 2002
Vulnerability Note VU#836088
Multiple vendors' email content/virus scanners do not adequately check "message/partial" MIME entities.

Print Friendly and PDF