Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Planning Our Passwordless Future
Colonial Pipeline Cyberattack: What Security Pros Need to Know
Troy Hunt: Organizations Make Security Choices Tough for Users
7 Modern-Day Cybersecurity Realities
News & Commentary
Adapting to the Security Threat of Climate Change
Lewis Huynh, Chief Security Officer, NinjaRMCommentary
Business continuity plans that address natural and manmade disasters can help turn a cataclysmic business event into a minor slowdown.
By Lewis Huynh Chief Security Officer, NinjaRM, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Defending the Castle: How World History Can Teach Cybersecurity a Lesson
Rob Gurzeev, CEO and Co-Founder of CyCognitoCommentary
Cybersecurity attackers follow the same principles practiced in warfare for millennia. They show up in unexpected places, seeking out portions of an organization's attack surface that are largely unmonitored and undefended.
By Rob Gurzeev CEO and Co-Founder of CyCognito, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Verizon DBIR 2021: "Winners" No Surprise, But All-round Vigilance Essential
Maxine Holt, Senior Research Director, Cybersecurity, OmdiaCommentary
Verizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems.
By Maxine Holt Senior Research Director, Cybersecurity, Omdia, 5/13/2021
Comment0 comments  |  Read  |  Post a Comment
Despite Heightened Breach Fears, Incident Response Capabilities Lag
Jai Vijayan, Contributing WriterNews
Many organizations remain unprepared to detect, respond, and contain a breach, a new survey shows.
By Jai Vijayan Contributing Writer, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Researchers Unearth 167 Fake iOS & Android Trading Apps
Dark Reading Staff, Quick Hits
The apps are disguised as financial trading, banking, and cryptocurrency apps from well-known and trusted organizations.
By Dark Reading Staff , 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Putting the Spotlight on DarkSide
Kelly Sheridan, Staff Editor, Dark ReadingNews
Incident responders share insight on the DarkSide ransomware group connected to the recent Colonial Pipeline ransomware attack.
By Kelly Sheridan Staff Editor, Dark Reading, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
66% of CISOs Feel Unprepared for Cyberattacks
Dark Reading Staff, Quick Hits
More than half of CISOs surveyed are more concerned about a cyberattack in 2021 than in 2020, researchers report.
By Dark Reading Staff , 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Vulnerable Protocols Leave Firms Open to Further Compromises
Robert Lemos, Contributing WriterNews
Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.
By Robert Lemos Contributing Writer, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Hashes, Salts, and Rainbow Tables: Confessions of a Password Cracker
Keira Stevens, Manager of Human intelligence, SpyCloudCommentary
Understanding a few basics about how password crackers think and behave could help you keep your users safer.
By Keira Stevens Manager of Human intelligence, SpyCloud, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5
In an effort to protect their organizations, security professionals can overdo it. The result often works against them.
By Joshua Goldfarb Director of Product Management at F5, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
Why You Should Be Prepared to Pay a Ransom
Christopher Muffat, CEO and founderCommentary
Companies that claim they'll never pay up in a ransomware attack are more likely to get caught flat-footed.
By Christopher Muffat CEO and founder, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
The Long Road to Rebuilding Trust After 'Golden SAML'-Like Attacks
Jai Vijayan, Contributing WriterNews
Eradicating 'privileged intruders' from the network in the aftermath of an attack poses major challenges, experts say.
By Jai Vijayan Contributing Writer, 5/12/2021
Comment0 comments  |  Read  |  Post a Comment
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Trinity Cyber takes a new spin on some traditional network-security techniques, but can its approach catch on widely?
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/11/2021
Comment1 Comment  |  Read  |  Post a Comment
Adobe Issues Patch for Acrobat Zero-Day
Dark Reading Staff, Quick Hits
The vulnerability is being exploited in limited attacks against Adobe Reader users on Windows.
By Dark Reading Staff , 5/11/2021
Comment0 comments  |  Read  |  Post a Comment
Application Attacks Spike as Criminals Target Remote Workers
Dark Reading Staff, Quick Hits
Application-specific and Web application attacks made up 67% of all attacks in 2020 as criminal strategies shifted in the pandemic.
By Dark Reading Staff , 5/11/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Patch Tuesday: 4 Critical CVEs, 3 Publicly Known, 1 Wormable
Kelly Sheridan, Staff Editor, Dark ReadingNews
Microsoft releases security patches for 55 vulnerabilities in its monthly roundup, which includes a critical, wormable flaw in the HTTP protocol stack.
By Kelly Sheridan Staff Editor, Dark Reading, 5/11/2021
Comment0 comments  |  Read  |  Post a Comment
Cartoon Caption Winner: Greetings, Earthlings
John Klossner, CartoonistCommentary
And the winner of Dark Reading's April cartoon caption contest is ...
By John Klossner Cartoonist, 5/11/2021
Comment0 comments  |  Read  |  Post a Comment
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato NetworksCommentary
Deeply rooted cybersecurity misconceptions are poisoning our ability to understand and defend against attacks.
By Etay Maor Sr. Director Security Strategy at Cato Networks, 5/11/2021
Comment0 comments  |  Read  |  Post a Comment
Critical Infrastructure Under Attack
Marc Wilczek, Digital Strategist & COO of Link11Commentary
Several recent cyber incidents targeting critical infrastructure prove that no open society is immune to attacks by cybercriminals. The recent shutdown of key US energy pipeline marks just the tip of the iceberg.
By Marc Wilczek Digital Strategist & COO of Link11, 5/11/2021
Comment0 comments  |  Read  |  Post a Comment
Colonial Pipeline Cyberattack: What Security Pros Need to Know
Kelly Sheridan, Staff Editor, Dark ReadingNews
As the massive US pipeline operator works to restore operations after a DarkSide ransomware attack late last week, experts say it's a cautionary tale for critical infrastructure providers.
By Kelly Sheridan Staff Editor, Dark Reading, 5/10/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

In an effort to protect their organizations, security professionals can overdo it. The result often works against them.
Give your cybersecurity culture a boost by adding these to the "don't" column of your cybersecurity awareness training do's and don'ts list.
We asked you to tell the truth about why you secretly love passwords. From the heartfelt to the hilarious, here's what you had to say.
Register for Dark Reading Newsletters
Cartoon
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-20092
PUBLISHED: 2021-05-13
File Upload vulnerability exists in ArticleCMS 1.0 via the image upload feature at /admin by changing the Content-Type to image/jpeg and placing PHP code after the JPEG data, which could let a remote malicious user execute arbitrary PHP code.
CVE-2020-21342
PUBLISHED: 2021-05-13
Insecure permissions issue in zzcms 201910 via the reset any user password in /one/getpassword.php.
CVE-2020-25713
PUBLISHED: 2021-05-13
A malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common.
CVE-2020-27823
PUBLISHED: 2021-05-13
A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2020-27830
PUBLISHED: 2021-05-13
A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
Flash Poll
Video
Slideshows
Twitter Feed