Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

What I Wish I Knew at the Start of My InfoSec Career
7 Things We Know So Far About the SolarWinds Attacks
Fighting Fileless Malware, Part 1: What Is It?
US Unseals Indictments Against North Korean Cyberattackers for Thefts Totaling $1.3B
News & Commentary
Kia Denies Ransomware Attack as IT Outage Continues
Dark Reading Staff, Quick Hits
Kia Motors America states there is no evidence its recent systems outage was caused by a ransomware attack.
By Dark Reading Staff , 2/19/2021
Comment1 Comment  |  Read  |  Post a Comment
Attackers Already Targeting Apple's M1 Chip with Custom Malware
Robert Lemos, Contributing WriterNews
A proof-of-concept program infects systems with ARM64-compiled binaries and then reaches out to download additional functionality.
By Robert Lemos Contributing Writer, 2/19/2021
Comment0 comments  |  Read  |  Post a Comment
How to Fine-Tune Vendor Risk Management in a Virtual World
Ryan Smyth & Spencer MacDonald, Managing Director / Director, FTI TechnologyCommentary
Without on-site audits, many organizations lack their usual visibility to assess risk factors and validate contracts and SLA with providers.
By Ryan Smyth & Spencer MacDonald Managing Director / Director, FTI Technology, 2/19/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Concludes Internal Investigation into Solorigate Breach
Robert Lemos, Contributing WriterNews
The software giant found no evidence that attackers gained extensive access to services or customer data.
By Robert Lemos Contributing Writer, 2/18/2021
Comment0 comments  |  Read  |  Post a Comment
CrowdStrike Buys Log Management Startup Humio for $400M
Dark Reading Staff, Quick Hits
CrowdStrike plans to use Humio's technology to continue building out its extended detection and response platform.
By Dark Reading Staff , 2/18/2021
Comment0 comments  |  Read  |  Post a Comment
Apple Offers Closer Look at Its Platform Security Technologies, Features
Jai Vijayan, Contributing WriterNews
In a nearly 200-page document, company offers a detailed overview of Secure Enclave and multiple other security controls in Apple silicon-based Macs and other platforms.
By Jai Vijayan Contributing Writer, 2/18/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Azure Front Door Gets a Security Upgrade
Kelly Sheridan, Staff Editor, Dark ReadingNews
New SKUs in Standard and Premium preview beef up the security of the content delivery network platform.
By Kelly Sheridan Staff Editor, Dark Reading, 2/18/2021
Comment0 comments  |  Read  |  Post a Comment
Hiding in Plain Sight: What the SolarWinds Attack Revealed About Efficacy
Pieter Danhieux, CEO, Chairman, & Co-Founder, Secure Code WarriorCommentary
Multilayered infiltration involved custom malicious tooling, backdoors, and cloaked code, far beyond the skills of script kiddies.
By Pieter Danhieux CEO, Chairman, & Co-Founder, Secure Code Warrior, 2/18/2021
Comment0 comments  |  Read  |  Post a Comment
Data Security Accountability in an Age of Regular Breaches
Tanner Johnson, Senior Analyst, Connectivity & IoT, OMDIACommentary
As the number of vendors impacted by supply chain breaches grows, one constant question remains: Where exactly does accountability for data security lie, and what part do end users play in their own data breach protection?
By Tanner Johnson Senior Analyst, Connectivity & IoT, OMDIA, 2/18/2021
Comment0 comments  |  Read  |  Post a Comment
How to Run a Successful Penetration Test
Steve Zurier, Contributing Writer
These seven tips will help ensure a penetration test improves your organization's overall security posture.
By Steve Zurier Contributing Writer, 2/18/2021
Comment1 Comment  |  Read  |  Post a Comment
Virginia Takes Different Tack Than California With Data Privacy Law
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLCCommentary
Online businesses targeting Virginia consumers and have personal data of 100,000 consumers in the state must conform to the new statute.
By Beth Burgin Waller Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC, 2/18/2021
Comment0 comments  |  Read  |  Post a Comment
The Edge Pro Tip: Say What You Know
Edge Editors, Dark Reading
During the immediate period following a breach, it's vital to move fast — but not trip over yourself.
By Edge Editors Dark Reading, 2/18/2021
Comment0 comments  |  Read  |  Post a Comment
Egregor Arrests a Blow, but Ransomware Will Likely Bounce Back
Robert Lemos, Contributing WriterNews
Similar to previous ransomware takedowns, this disruption to the ransomware-as-a-service model will likely be short-lived, security experts say.
By Robert Lemos Contributing Writer, 2/17/2021
Comment0 comments  |  Read  |  Post a Comment
US Unseals Indictments Against North Korean Cyberattackers for Thefts Totaling $1.3B
Jai Vijayan, Contributing WriterNews
FBI, CISA, and Treasury Department also release details about North Korean malware used in cryptocurrency thefts since 2018.
By Jai Vijayan Contributing Writer, 2/17/2021
Comment0 comments  |  Read  |  Post a Comment
White House Says 100 Private Sector Orgs Hit in SolarWinds Campaign
Dark Reading Staff, Quick Hits
Anne Neuberger, a top Biden cybersecurity official, provided an update on the government's investigation into the massive breach.
By Dark Reading Staff , 2/17/2021
Comment0 comments  |  Read  |  Post a Comment
Kia Faces $20M DoppelPaymer Ransomware Attack
Dark Reading Staff, Quick Hits
Kia Motors America this week experienced a nationwide IT outage; now, reports indicate the company was hit with ransomware.
By Dark Reading Staff , 2/17/2021
Comment0 comments  |  Read  |  Post a Comment
Ransomware? Let's Call It What It Really Is: Extortionware
Charlie Winckless, Senior Director, Cybersecurity Solutions, at PresidioCommentary
Just as the targets of these attacks have shifted from individuals to corporations, so too has the narrow focus given way to applying force and pressure to pay.
By Charlie Winckless Senior Director, Cybersecurity Solutions, at Presidio, 2/17/2021
Comment0 comments  |  Read  |  Post a Comment
Breach Etiquette: How to Mind Your Manners When It Matters
Samuel Greengard, Freelance Writer
Panic-stricken as you may be in the face of a cyberattack, keeping calm and, perhaps most importantly, responding appropriately are critical to limiting the damage.
By Samuel Greengard Freelance Writer, 2/17/2021
Comment0 comments  |  Read  |  Post a Comment
Enterprise Windows Threats Drop as Mac Attacks Rise: Report
Kelly Sheridan, Staff Editor, Dark ReadingNews
An analysis of 2020 malware activity indicates businesses should be worried about internal hack tools, ransomware, and spyware in the year ahead.
By Kelly Sheridan Staff Editor, Dark Reading, 2/17/2021
Comment0 comments  |  Read  |  Post a Comment
4 Predictions for the Future of Privacy
Bart Willemsen, Research Vice President at GartnerCommentary
Use these predictions to avoid pushback, find opportunity, and create value for your organization.
By Bart Willemsen Research Vice President at Gartner, 2/17/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by mmillslagel85001
Current Conversations That's a great drum.
In reply to: campfire
Post Your Own Reply
More Conversations
PR Newswire
Security Now Joins Dark Reading

Find out more about the combination of two of the industry's leading cybersecurity news sites.

Panic-stricken as you may be in the face of a cyberattack, keeping calm and, perhaps most importantly, responding appropriately are critical to limiting the damage.
Attackers can dodge the countermeasures you employ against fileless malware. So how do you mitigate the damage?
With the pandemic as a backdrop, cybercriminals have recognized an unprecedented opportunity to steer billions of dollars in unemployment claims into the own accounts.
Register for Dark Reading Newsletters
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I said I wanted 'fish' for dinner, he thought I said 'phish'.
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27513
PUBLISHED: 2021-02-22
The module admin_ITSM in EyesOfNetwork 5.3-10 allows remote authenticated users to upload arbitrary .xml.php files because it relies on "le filtre userside."
CVE-2021-27514
PUBLISHED: 2021-02-22
EyesOfNetwork 5.3-10 uses an integer of between 8 and 10 digits for the session ID, which might be leveraged for brute-force authentication bypass (such as in CVE-2021-27513 exploitation).
CVE-2021-27515
PUBLISHED: 2021-02-22
url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.
CVE-2021-27516
PUBLISHED: 2021-02-22
URI.js (aka urijs) before 1.19.6 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.
CVE-2021-26716
PUBLISHED: 2021-02-21
Modules/input/Views/schedule.php in Emoncms through 10.2.7 allows XSS via the node parameter.
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Flash Poll
Video
Slideshows
Twitter Feed