Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

11 Cybersecurity Vendors to Watch in 2021
Required MFA Is Not Sufficient for Strong Security: Report
Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work
New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'
News & Commentary
Ukraine Police Disrupt Cl0p Ransomware Operation
Jai Vijayan, Contributing WriterNews
Growing list of similar actions in recent months may finally be scaring some operators into quitting, but threat is far from over, security experts say.
By Jai Vijayan Contributing Writer, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Ransomware Operators' Strategies Evolve as Attacks Rise
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security researchers find ransomware operators rely less on email and more on criminal groups for initial access into target networks.
By Kelly Sheridan Staff Editor, Dark Reading, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Biden Tells Putin Critical Infrastructure Sectors 'Off Limits' to Russian Hacking
Dark Reading Staff, Quick Hits
President Joe Biden said he and Russian President Vladimir Putin agreed to discuss boundaries in cyber activity.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Security Flaw Discovered In Peloton Equipment
Dark Reading Staff, Quick Hits
The vulnerability could give attackers remote root access to the bike's tablet, researchers report.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Cars, Medicine, Electric Grids: Future Hackers Will Hit Much More Than Networks in an IT/OT Integrated World
Greg Valentine, Senior Cybersecurity Director, Capgemini North AmericaCommentary
Intelligent systems must include the right cybersecurity protections to prevent physical threats to operational technology.
By Greg Valentine Senior Cybersecurity Director, Capgemini North America, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Russian National Convicted on Charges Related to Kelihos Botnet
Dark Reading Staff, Quick Hits
Oleg Koshkin was arrested in 2019 and faces a maximum penalty of 15 years in prison, the DoJ reports.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Is an Attacker Living Off Your Land?
Samuel Greengard, Freelance Writer
Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.
By Samuel Greengard Freelance Writer, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Keeping Your Organization Secure When Dealing With the Unexpected
Zane Lackey, Co-Founder and CSO of Signal SciencesCommentary
There's no way to anticipate every possible scenario, but the right approach to business continuity can help you respond effectively in any situation.
By Zane Lackey Co-Founder and CSO of Signal Sciences, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Don't Get Stymied by Security Indecision
Alex Pezold, Founder & Chief Executive Officer, TokenExCommentary
You might be increasing cyber-risk by not actively working to reduce it.
By Alex Pezold Founder & Chief Executive Officer, TokenEx, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet
Jai Vijayan, Contributing WriterNews
Three weeks after company disclosed two critical vulnerabilities in the workload management utility, many organizations have not patched the technology yet, security vendor says.
By Jai Vijayan Contributing Writer, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark ReadingNews
Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.
By Kelly Sheridan Staff Editor, Dark Reading, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Security Experts Scrutinize Apple, Amazon IoT Networks
Robert Lemos, Contributing WriterNews
Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.
By Robert Lemos Contributing Writer, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Andariel Group Targets South Korean Entities in New Campaign
Dark Reading Staff, Quick Hits
Andariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.
By Dark Reading Staff , 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities
Dark Reading Staff, Quick Hits
Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.
By Dark Reading Staff , 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain
Chen Fradkin, Security Researcher at ClarotyCommentary
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.
By Chen Fradkin Security Researcher at Claroty, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
How President Biden Can Better Defend the US From Russian Hacks
Carlo Massimo, Freelance Writer
Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.
By Carlo Massimo Freelance Writer, 6/15/2021
Comment1 Comment  |  Read  |  Post a Comment
How Does the Government Buy Its Cybersecurity?
Josh Ladick, President of GSA Focus, Inc.Commentary
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.
By Josh Ladick President of GSA Focus, Inc., 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
VPN Attacks Surged in First Quarter
Jai Vijayan, Contributing WriterNews
But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.
By Jai Vijayan Contributing Writer, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Cyber Analytics Database Exposed 5 Billion Records Online
Dark Reading Staff, Quick Hits
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Google Workspace Adds Client-Side Encryption
Dark Reading Staff, Quick Hits
Users given control over encryption keys, Google says.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.
Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.
The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.
Register for Dark Reading Newsletters
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31476
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
CVE-2021-31477
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-...
CVE-2021-32690
PUBLISHED: 2021-06-16
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This...
CVE-2021-32691
PUBLISHED: 2021-06-16
Apollos Apps is an open source platform for launching church-related apps. In Apollos Apps versions prior to 2.20.0, new user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within th...
CVE-2021-32243
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).
Flash Poll
Video
Slideshows
Twitter Feed