Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Cloud posted in May 2021
3 SASE Misconceptions to Consider
Commentary  |  5/31/2021  | 
SASE is all the rage, promising things IT leaders have long dreamed about, but a purist approach may create consequences.
Acronis: Pandemic Hastened Cloud Migration, Prompting New Security Issues
Commentary  |  5/27/2021  | 
SPONSORED: WATCH NOW -- The COVID-19 pandemic has accelerated an ongoing shift in data away from business data centers to home offices and the cloud, explains Candid Wuëst, VP of cyber protection research for Acronis.
How Menlo Uses Isolation to Secure Mobile Devices in the Cloud
Commentary  |  5/27/2021  | 
SPONSORED: WATCH NOW -- Mobile devices like smartphones and tablets have emerged as popular targets for bad actors looking to break into to cloud-based networks, according to Poornima DeBolle, chief product officer for Menlo Security.
Zscaler Buys Deception Technology Startup
Quick Hits  |  5/26/2021  | 
ZScaler's CEO says Smokescreen Technologies' capabilities will be integrated with Zscaler’s ZIA and ZPA products.
Cloud Compromise Costs Organizations $6.2M Per Year
News  |  5/25/2021  | 
Organizations reported an average of 19 cloud-based compromises in the past year, but most don't evaluate the security of SaaS apps before deployment.
Businesses Boost Security Budgets. Where Will the Money Go?
News  |  5/25/2021  | 
Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post-breach costs, and spending priorities.
As Threat Hunting Matures, Malware Labs Emerge
Commentary  |  5/24/2021  | 
By leveraging their analysis outputs, security pros can update detection rules engines and establish a stronger security posture in the process.
Maricopa County CISO: Online Misinformation/Disinformation in 2020 Election a 'Gamechanger'
Quick Hits  |  5/20/2021  | 
Custom playbooks played a key role in the Arizona election jurisdiction's security strategy.
100M Users' Data Exposed via Third-Party Cloud Misconfigurations
Quick Hits  |  5/20/2021  | 
Researchers who examined 23 Android apps report developers potentially exposed the data of more than 100 million people.
Cost Savings, Better Security Drive Adoption of Emerging Technologies
News  |  5/20/2021  | 
However, senior technology managers express concerns about whether their current infrastructure can properly safeguard them.
Cobalt Strike Becomes a Preferred Hacking Tool by Cybercrime, APT Groups
News  |  5/19/2021  | 
Incident response cases and research show how the red-team tool has become a become a go-to for attackers.
Attackers Took 5 Minutes to Start Scanning for Exchange Server Flaws
News  |  5/19/2021  | 
Research underscores the acceleration of attack activity and points to a growing concern that defenders can't keep pace.
Automation & Pervasive, Connected Technology to Pose Cyber Threats in 2030
News  |  5/19/2021  | 
A project to look at potential cybersecurity threats in a decade sees hackers and marketers sending spam directly to our vision, while attackers' automated systems adapt faster than defenses.
Credential Stuffing Reaches 193 Billion Login Attempts Annually
News  |  5/19/2021  | 
More attacks does not necessarily mean more threats, but all attacks types have increased, according to Akamai's new "State of the Internet" report.
How Ransomware Encourages Opportunists to Become Criminals
Commentary  |  5/19/2021  | 
And what's needed to stop it: Better information sharing among private organizations and with law enforcement agencies.
Splunk to Acquire TruSTAR for Data Management
Quick Hits  |  5/18/2021  | 
Splunk said it will integrate TruSTAR's data-sharing capabilities into its Data-to-Everything platform following the acquisition.
Researchers Create Covert Channel Over Apple AirTag Network
News  |  5/18/2021  | 
Small amounts of data could be sent from nearly anywhere using Apple's "Find My" network, hidden in the large volume of traffic as AirTags become widely used, two researchers say.
Cisco Plans to Create 'Premium' SecureX Offering With Kenna Security Features
News  |  5/18/2021  | 
Executives from Cisco share insights on the networking giant's ambitious security strategy.
Name That Toon: Road Trip
Commentary  |  5/17/2021  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Firms Struggle to Secure Multicloud Misconfigurations
News  |  5/13/2021  | 
Half of companies had at least one case of having all ports open to the public, while more than a third had an exposed database.
When AI Becomes the Hacker
News  |  5/13/2021  | 
Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.
66% of CISOs Feel Unprepared for Cyberattacks
Quick Hits  |  5/12/2021  | 
More than half of CISOs surveyed are more concerned about a cyberattack in 2021 than in 2020, researchers report.
Vulnerable Protocols Leave Firms Open to Further Compromises
News  |  5/12/2021  | 
Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.
Most Organizations Feel More Vulnerable to Breaches Amid Pandemic
Quick Hits  |  5/7/2021  | 
More than half of business see the need for significant long-term changes to IT due to COVID-19, research finds.
Cloud-Native Businesses Struggle With Security
News  |  5/6/2021  | 
More companies moved to cloud-native infrastructure in the past year, and security incidents and malware moved right along with them.
Wanted: The (Elusive) Cybersecurity 'All-Star'
News  |  5/5/2021  | 
Separate workforce studies by (ISC)² and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the field.
Dark Reading Celebrates 15th Anniversary
Commentary  |  5/3/2021  | 
Cybersecurity news site begins 16th year with plans to improve site, deliver more content on cyber threats and best practices.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file