Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in July 2021
Biden Administration Responds to Geopolitical Cyber Threats
Commentary  |  7/23/2021  | 
In response to growing concerns regarding the recent uptick in large-scale, nation-state-backed ransomware attacks on critical infrastructure, the Biden administration is taking new action to tackle the evolving challenges posed by ransomware attacks.
7 Ways AI and ML Are Helping and Hurting Cybersecurity
Commentary  |  7/19/2021  | 
In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they can create significant harm.
Breaking Down the Threat of Going All-In With Microsoft Security
Commentary  |  7/19/2021  | 
Limit risk by dividing responsibility for infrastructure, tools, and security.
4 Future Integrated Circuit Threats to Watch
Commentary  |  7/16/2021  | 
Threats to the supply chains for ICs and other computer components are poised to wreak even more havoc on organizations.
How to Bridge On-Premises and Cloud Identity
Commentary  |  7/15/2021  | 
Identity fabric, a cloud-native framework, removes the need for multiple, siloed, proprietary identity systems.
What to Look for in an Effective Threat Hunter
Commentary  |  7/15/2021  | 
The most important personality traits, skills, and certifications to look for when hiring a threat hunting team.
Did the Cybersecurity Workforce Gap Distract Us From the Leak?
Commentary  |  7/14/2021  | 
Cyber games can play a critical role in re-engaging our workforce and addressing the employee retention crisis.
4 Integrated Circuit Security Threats and How to Protect Against Them
Commentary  |  7/14/2021  | 
Little-understood threats involving the IC supply chain are putting organizations around the world at risk.
Why We Need to Raise the Red Flag Against FragAttacks
Commentary  |  7/13/2021  | 
Proliferation of wireless devices increases the risk that corporate networks will be attacked with this newly discovered breed of Wi-Fi-based cyber assault.
The Trouble With Automated Cybersecurity Defenses
Commentary  |  7/13/2021  | 
While there's enormous promise in AI-powered tools and machine learning, they are very much a double-edged sword.
AI and Cybersecurity: Making Sense of the Confusion
Commentary  |  7/12/2021  | 
Artificial intelligence is a maturing area in cybersecurity, but there are different concerns depending on whether you're a defender or an attacker.
It's in the Game (but It Shouldn't Be)
Commentary  |  7/9/2021  | 
Five ways that game developers (and others) can avoid falling victim to an attack like the one that hit EA.
Cartoon Caption Winner: Sight Unseen
Commentary  |  7/9/2021  | 
And the winner of Dark Reading's June contest is ...
Kaseya Hacked via Authentication Bypass
Commentary  |  7/8/2021  | 
The Kaseya ransomware attack is believed to have been down to an authentication bypass. Yes, ransomware needs to be on your radar -- but good authentication practices are also imperative.
What Colonial Pipeline Means for Commercial Building Cybersecurity
Commentary  |  7/8/2021  | 
Banks and hospitals may be common targets, but now commercial real estate must learn to protect itself against stealthy hackers.
Are Security Attestations a Necessity for SaaS Businesses?
Commentary  |  7/7/2021  | 
Are security attestations becoming business imperatives, or are they merely token additions on the list of regulatory requirements?
Autonomous Security Is Essential if the Edge Is to Scale Properly
Commentary  |  7/7/2021  | 
Service demands at the network edge mean customers need to get cost, performance, and security right.
It's High Time for a Security Scoring System for Applications and Open Source Libraries
Commentary  |  7/6/2021  | 
A benchmarking system would help buyers choose more secure software products and, more importantly, light a fire underneath software producers to make products secure.
8 Ways to Preserve Legal Privilege After a Cybersecurity Incident
Commentary  |  7/6/2021  | 
Knowing your legal distinctions can make defense easier should you end up in court after a breach, attack, or data loss.
Watch for Cybersecurity Games at the Tokyo Olympics
Commentary  |  7/5/2021  | 
The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications.
WFH: A Smart Time to Revisit Employee Use of Social Media
Commentary  |  7/2/2021  | 
Employers have their hands full when it comes to monitoring online activities that could hurt the brand or violate the organization's core values.
Why Are There Never Enough Logs During an Incident Response?
Commentary  |  7/1/2021  | 
Most security pros believe their responses could be dramatically quicker were the right logs available, and usually they're not.
Stop Playing Catchup: Move From Reactive to Proactive to Defeat Cyber Threats
Commentary  |  7/1/2021  | 
One-time reactive measures can't keep up. It's time to be proactive and pick our swords and not just our shields.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31650
PUBLISHED: 2022-05-25
In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwrite in aiff.c in libsox.a.
CVE-2022-31651
PUBLISHED: 2022-05-25
In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.
CVE-2022-29256
PUBLISHED: 2022-05-25
sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5. If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` e...
CVE-2022-26067
PUBLISHED: 2022-05-25
An information disclosure vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to arbitrary file read. An attacker can send a sequence of requests to trigger this vulnera...
CVE-2022-26077
PUBLISHED: 2022-05-25
A cleartext transmission of sensitive information vulnerability exists in the OAS Engine configuration communications functionality of Open Automation Software OAS Platform V16.00.0112. A targeted network sniffing attack can lead to a disclosure of sensitive information. An attacker can sniff networ...