Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in May 2021
Page 1 / 3   >   >>
3 SASE Misconceptions to Consider
Commentary  |  5/31/2021  | 
SASE is all the rage, promising things IT leaders have long dreamed about, but a purist approach may create consequences.
Chinese APT Groups Continue to Pound Away on Pulse Secure VPNs
News  |  5/28/2021  | 
Security vendor says it has observed threat groups using a set of 16 tools specifically designed to attack Pulse Secure devices since April 2020.
Modern SOCs a 'Painful' Challenge Amid Growing Complexity: Report
Quick Hits  |  5/28/2021  | 
A new study examines the tools and technologies driving investment and activities for security operations centers.
SolarWinds Attackers Impersonate USAID in Advanced Email Campaign
News  |  5/28/2021  | 
Microsoft shares the details of a wide-scale malicious email campaign attributed to Nobelium, the group linked to the SolarWinds supply chain attack.
Siemens Patches Major PLC Flaw that Bypasses Its 'Sandbox' Protection
Quick Hits  |  5/28/2021  | 
Researchers from Claroty today detailed the memory vuln they discovered in Siemens SIMATIC S7-1200 and S7-1500 PLCs.
Plug-ins for Code Editors Pose Developer-Security Threat
News  |  5/28/2021  | 
There are two critical vulnerabilities in plug-ins for the popular Visual Studio Code editor, now patched, but security firm Snyk warns that popular plug-ins could put development environments in jeopardy.
Most Mobile Apps Can Be Compromised in 15 Minutes or Less
Commentary  |  5/28/2021  | 
In the name of releasing apps quickly and delivering a smooth user experience, mobile app security is often given short shrift.
'Have I Been Pwned' Code Base Now Open Source
Quick Hits  |  5/27/2021  | 
Founder Troy Hunt also announces the platform will receive compromised passwords the FBI finds in its investigations.
BazaLoader Attackers Create Fake Movie Streaming Site to Trick Victims
Quick Hits  |  5/27/2021  | 
The BazaLoader infection chain includes a live call center and "customer service" from criminals, researchers report.
Acronis: Pandemic Hastened Cloud Migration, Prompting New Security Issues
Commentary  |  5/27/2021  | 
SPONSORED: WATCH NOW -- The COVID-19 pandemic has accelerated an ongoing shift in data away from business data centers to home offices and the cloud, explains Candid Wust, VP of cyber protection research for Acronis.
Let's Stop Blaming Employees for Our Data Breaches
Commentary  |  5/27/2021  | 
Assuming employees want to steal trade secrets pits them against your security teams, creates stress and reduces productivity.
DHS Orders Pipeline Operators to Report Cyberattacks, Review Security Posture
News  |  5/27/2021  | 
On the heels of the Colonial Pipeline attack, the US Department of Homeland Security aims to force a reticent industry to improve its ability to detect and respond to cybersecurity attacks.
How Menlo Uses Isolation to Secure Mobile Devices in the Cloud
Commentary  |  5/27/2021  | 
SPONSORED: WATCH NOW -- Mobile devices like smartphones and tablets have emerged as popular targets for bad actors looking to break into to cloud-based networks, according to Poornima DeBolle, chief product officer for Menlo Security.
Prevention Is the Only Cure: The Dangers of Legacy Systems
Commentary  |  5/27/2021  | 
Prolonged exposure to poorly managed legacy IT devices proves time and time again the familiar adage: What can go wrong will go wrong.
ExtraHop Explains How Advanced Threats Dominate Threat Landscape
Commentary  |  5/27/2021  | 
SPONSORED: WATCH NOW -- How do SOC professionals build a strategy when they lack basic information about how such threats operate? Advanced threats by their very nature create plenty of uncertainty, according to Matt Cauthorn, VP of cloud security for ExtraHop.
Enterprises Applying OS Patches Faster as Endpoint Risks Grow
News  |  5/26/2021  | 
New study shows sharp increase in number of endpoint devices with sensitive data on them.
Google Discovers New Rowhammer Attack Technique
Quick Hits  |  5/26/2021  | 
Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.
Zscaler Buys Deception Technology Startup
Quick Hits  |  5/26/2021  | 
ZScaler's CEO says Smokescreen Technologies' capabilities will be integrated with Zscalers ZIA and ZPA products.
Cisco: Reduced Complexity in the SOC Improves Enterprise Security
Commentary  |  5/26/2021  | 
SPONSORED: WATCH NOW -- All it took was a global pandemic and a shift to working from home to expose security operations centers' open secret: Too much software, systems, and data to filter. Dug Song, chief strategy officer of Cisco Secure, makes a strong case for why reducing that complexity is the only tenable way forward for security professionals.
Bug Bounties and the Cobra Effect
Commentary  |  5/26/2021  | 
Are bug bounty programs allowing software companies to skirt their responsibility to make better, more secure products from the get-go?
Devo: SIEM Continues to Evolve with Tech Trends and Emerging Threats
Commentary  |  5/26/2021  | 
SPONSORED: WATCH NOW -- Some organizations split the difference with a hybrid of premises- and cloud-based SIEM, says Ted Julian, senior VP of product at Devo. As security data volumes continue to increase, SIEM's evolution will only continue.
Messaging Apps: The Latest Hotbed in the Fraud Ecosystem
Commentary  |  5/26/2021  | 
Telegram and other secure messaging apps have become a haven for professional criminals to wreak havoc and turn a profit.
New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks
News  |  5/26/2021  | 
The Agrius group's focus appears to be Israel and the Middle East.
Orange: Your Leaky Security is Coming from Inside the House!
Commentary  |  5/26/2021  | 
SPONSORED: Your home WiFi router may be screaming fast, but it's also a major point of vulnerability in this work-from-home era, says Charl van der Walt, head of security research at Orange Cyberdefense. And while Zero Trust offers some relief, he offers up some how-to advice to ensure it's properly deployed.
Cloud Compromise Costs Organizations $6.2M Per Year
News  |  5/25/2021  | 
Organizations reported an average of 19 cloud-based compromises in the past year, but most don't evaluate the security of SaaS apps before deployment.
Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks
News  |  5/25/2021  | 
Security researchers at Mandiant have seen an increasing wave of relatively simplistic attacks involving ICS systems - and attackers sharing their finds with one another - since 2020.
Russia Profiting from Massive Hydra Cybercrime Marketplace
News  |  5/25/2021  | 
An analysis of Bitcoin transactions from the Hydra marketplace show that the operators are locking sellers into Russian exchanges, likely fueling profits for local actors.
MacOS Zero-Day Let Attackers Bypass Privacy Preferences
Quick Hits  |  5/25/2021  | 
Apple has released security patches for vulnerabilities in macOS and tvOS that reports indicate have been exploited in the wild.
Axis Fosters Work-From-Home Momentum with Zero Trust Network Access
Commentary  |  5/25/2021  | 
SPONSORED: Watch now -- VPN and VDI, while still useful, lack the hardened security required to keep users secure. That's created an opening for Zero Trust network access.
Russian Sentenced to 30 Months for Running Criminal Website
Quick Hits  |  5/25/2021  | 
FBI says sales from illicit online shop deer.io exceeded $17 million
Your Network's Smallest Cracks Are Now Its Biggest Threats
Commentary  |  5/25/2021  | 
Bad actors have flipped the script by concentrating more on low-risk threats. Here's how to address the threat and the tactics.
Uptycs Offers Resilience Formula to Boost Business Continuity
Commentary  |  5/25/2021  | 
SPONSORED CONTENT: Breaches and data loss are inevitable, but customers can bounce back more readily with some planning and foresight, says Ganesh Pai, CEO and founder of Uptycs. He suggests a trajectory for customers looking to improve their own resilience, starting with proactiveness, followed by reactivity, then predictive capabilities and better protection.
The Adversary Within: Preventing Disaster From Insider Threats
Commentary  |  5/25/2021  | 
Insiders are in a position of trust, and their elevated permissions provide opportunities to cause serious harm to critical business applications and processes.
Businesses Boost Security Budgets. Where Will the Money Go?
News  |  5/25/2021  | 
Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post-breach costs, and spending priorities.
Turn the Tables: Supply Chain Defense Needs Some Offense, Fortinet Says
Commentary  |  5/25/2021  | 
SPONSORED CONTENT: Watch now -- While the SolarWinds hack put fresh attention on supply chain vulnerabilities, Derek Manky of Fortinet's Fortiguard Labs suggests dismantling cybercriminals' own supply chains.
Former FBI Employee Indicted for Taking Documents Home
Quick Hits  |  5/24/2021  | 
The long-time intelligence analyst was accused of inappropriately handling documents related to national security.
Air India Confirms Data of 4.5M Travelers Compromised
Quick Hits  |  5/24/2021  | 
Affected data includes names, birthdates, contact information, passport details, and credit card data, the airline reports.
Sophos Research Uncovers Widespread Use of TLS By Cybercriminals
Commentary  |  5/24/2021  | 
SPONSORED CONTENT: Nearly half of all malware is being disseminated via the Transport Layer Security cryptographic protocol, says Dan Schiappa, executive VP and chief product officer for Sophos.
Work from Home Modifies the Endpoint Security Equation, Cisco Says
Commentary  |  5/24/2021  | 
SPONSORED CONTENT: As customers get to grips with this new WFH reality, they'll need to simplify their implementations and make more use of automation, says Cisco Secure's Al Huger.
As Threat Hunting Matures, Malware Labs Emerge
Commentary  |  5/24/2021  | 
By leveraging their analysis outputs, security pros can update detection rules engines and establish a stronger security posture in the process.
Cyber Insurance Firms Start Tapping Out as Ransomware Continues to Rise
News  |  5/24/2021  | 
A global insurance carrier refuses to write new ransomware policies in France, while insurers rewrite policies. Are we heading toward a day when ransomware incidents become uninsurable?
Data in Danger Amid New IT Challenges
Quick Hits  |  5/21/2021  | 
Survey finds new threats due to the pandemic make managing enterprise cyber-risk even more challenging.
FBI Issues Conti Ransomware Alert as Attacks Target Healthcare
Quick Hits  |  5/21/2021  | 
Officials have identified at least 16 Conti ransomware attacks targeting US healthcare and first responder networks.
Latest Security News From RSAC 2021
News  |  5/21/2021  | 
Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2021.
The Changing Face of Cybersecurity Awareness
Commentary  |  5/21/2021  | 
In the two decades since cybersecurity awareness programs emerged, they've been transformed from a good idea to a business imperative.
Dev-Sec Disconnect Undermines Secure Coding Efforts
News  |  5/20/2021  | 
Rather than continue to complain about each other, developers and security pros need to work together and celebrate their successes.
Lack of Skills, Maturity Hamper Threat Hunting at Many Organizations
News  |  5/20/2021  | 
When implemented correctly, threat hunting can help organizations stay head of threats, researcher says at RSA Conference.
Maricopa County CISO: Online Misinformation/Disinformation in 2020 Election a 'Gamechanger'
Quick Hits  |  5/20/2021  | 
Custom playbooks played a key role in the Arizona election jurisdiction's security strategy.
100M Users' Data Exposed via Third-Party Cloud Misconfigurations
Quick Hits  |  5/20/2021  | 
Researchers who examined 23 Android apps report developers potentially exposed the data of more than 100 million people.
Security Providers Describe New Solutions (& Growing Threats) at RSAC
Commentary  |  5/20/2021  | 
SPONSORED CONTENT: Watch now -- Leading security companies meet Dark Reading in the RSA Conference Broadcast Alley to talk about tackling insider threat, SOC complexity, cyber resilience, mobile security, attacker evasion, supply chain threats, ransomware, and more.
Page 1 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37001
PUBLISHED: 2021-10-28
There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified.
CVE-2021-37002
PUBLISHED: 2021-10-28
There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed.
CVE-2021-22483
PUBLISHED: 2021-10-28
There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS.
CVE-2021-22485
PUBLISHED: 2021-10-28
There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2021-22486
PUBLISHED: 2021-10-28
There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality.