Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Planning Our Passwordless Future
Colonial Pipeline Cyberattack: What Security Pros Need to Know
Troy Hunt: Organizations Make Security Choices Tough for Users
7 Modern-Day Cybersecurity Realities
News & Commentary
Security Trends to Follow at RSA Conference 2021
Yonit Wiseman, Associate at YL VenturesCommentary
Here are three key categories of sessions that provide an inside look at some of today's most interesting cybersecurity trends.
By Yonit Wiseman Associate at YL Ventures, 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
Software, Incident Response Among Big Focus Areas in Biden's Cybersecurity Executive Order
Jai Vijayan, Contributing WriterNews
Overall objectives are good, but EO may be too prescriptive in parts, industry experts say.
By Jai Vijayan Contributing Writer, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
85% of Data Breaches Involve Human Interaction: Verizon DBIR
Kelly Sheridan, Staff Editor, Dark ReadingNews
Ransomware, phishing, and Web application attacks all increased during a year in which the majority of attacks involved a human element.
By Kelly Sheridan Staff Editor, Dark Reading, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Firms Struggle to Secure Multicloud Misconfigurations
Robert Lemos, Contributing WriterNews
Half of companies had at least one case of having all ports open to the public, while more than a third had an exposed database.
By Robert Lemos Contributing Writer, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Dragos & IronNet Partner on Critical Infrastructure Security
Dark Reading Staff, Quick Hits
The IT and OT security providers will integrate solutions aimed at improving critical infrastructure security
By Dark Reading Staff , 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
When AI Becomes the Hacker
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Adds GPS Location to Identity & Access Control in Azure AD
Dark Reading Staff, Quick Hits
New capabilities let admins restrict access to resources from privileged access workstations or regions based on GPS location.
By Dark Reading Staff , 5/13/2021
Comment1 Comment  |  Read  |  Post a Comment
Adapting to the Security Threat of Climate Change
Lewis Huynh, Chief Security Officer, NinjaRMCommentary
Business continuity plans that address natural and manmade disasters can help turn a cataclysmic business event into a minor slowdown.
By Lewis Huynh Chief Security Officer, NinjaRM, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Defending the Castle: How World History Can Teach Cybersecurity a Lesson
Rob Gurzeev, CEO and Co-Founder of CyCognitoCommentary
Cybersecurity attackers follow the same principles practiced in warfare for millennia. They show up in unexpected places, seeking out portions of an organization's attack surface that are largely unmonitored and undefended.
By Rob Gurzeev CEO and Co-Founder of CyCognito, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Verizon DBIR 2021: "Winners" No Surprise, But All-round Vigilance Essential
Maxine Holt, Senior Research Director, Cybersecurity, OmdiaCommentary
Verizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems.
By Maxine Holt Senior Research Director, Cybersecurity, Omdia, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Despite Heightened Breach Fears, Incident Response Capabilities Lag
Jai Vijayan, Contributing WriterNews
Many organizations remain unprepared to detect, respond, and contain a breach, a new survey shows.
By Jai Vijayan Contributing Writer, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Researchers Unearth 167 Fake iOS & Android Trading Apps
Dark Reading Staff, Quick Hits
The apps are disguised as financial trading, banking, and cryptocurrency apps from well-known and trusted organizations.
By Dark Reading Staff , 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Putting the Spotlight on DarkSide
Kelly Sheridan, Staff Editor, Dark ReadingNews
Incident responders share insight on the DarkSide ransomware group connected to the recent Colonial Pipeline ransomware attack.
By Kelly Sheridan Staff Editor, Dark Reading, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
66% of CISOs Feel Unprepared for Cyberattacks
Dark Reading Staff, Quick Hits
More than half of CISOs surveyed are more concerned about a cyberattack in 2021 than in 2020, researchers report.
By Dark Reading Staff , 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Vulnerable Protocols Leave Firms Open to Further Compromises
Robert Lemos, Contributing WriterNews
Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.
By Robert Lemos Contributing Writer, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Hashes, Salts, and Rainbow Tables: Confessions of a Password Cracker
Keira Stevens, Manager of Human intelligence, SpyCloudCommentary
Understanding a few basics about how password crackers think and behave could help you keep your users safer.
By Keira Stevens Manager of Human intelligence, SpyCloud, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5
In an effort to protect their organizations, security professionals can overdo it. The result often works against them.
By Joshua Goldfarb Director of Product Management at F5, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Why You Should Be Prepared to Pay a Ransom
Christopher Muffat, CEO and founderCommentary
Companies that claim they'll never pay up in a ransomware attack are more likely to get caught flat-footed.
By Christopher Muffat CEO and founder, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
The Long Road to Rebuilding Trust After 'Golden SAML'-Like Attacks
Jai Vijayan, Contributing WriterNews
Eradicating 'privileged intruders' from the network in the aftermath of an attack poses major challenges, experts say.
By Jai Vijayan Contributing Writer, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Trinity Cyber takes a new spin on some traditional network-security techniques, but can its approach catch on widely?
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/11/2021
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

In an effort to protect their organizations, security professionals can overdo it. The result often works against them.
Give your cybersecurity culture a boost by adding these to the "don't" column of your cybersecurity awareness training do's and don'ts list.
We asked you to tell the truth about why you secretly love passwords. From the heartfelt to the hilarious, here's what you had to say.
Register for Dark Reading Newsletters
Cartoon
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27184
PUBLISHED: 2021-05-14
The NPort IA5000A Series devices use Telnet as one of the network device management services. Telnet does not support the encryption of client-server communications, making it vulnerable to Man-in-the-Middle attacks.
CVE-2020-27185
PUBLISHED: 2021-05-14
Cleartext transmission of sensitive information via Moxa Service in NPort IA5000A series serial devices. Successfully exploiting the vulnerability could enable attackers to read authentication data, device configuration, and other sensitive data transmitted over Moxa Service.
CVE-2021-32613
PUBLISHED: 2021-05-14
In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.
CVE-2021-24192
PUBLISHED: 2021-05-14
Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the Tree Sitemap WordPress plugin before 2.9, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers insta...
CVE-2021-24193
PUBLISHED: 2021-05-14
Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the Visitor Traffic Real Time Statistics WordPress plugin before 2.12, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, wh...
Flash Poll
Video
Slideshows
Twitter Feed