Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

11 Cybersecurity Vendors to Watch in 2021
Required MFA Is Not Sufficient for Strong Security: Report
Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work
New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'
News & Commentary
Are Ransomware Attacks the New Pandemic?
Bill Harrod, Federal CTO, IvantiCommentary
Ransomware has been a problem for decades, so why is government just now beginning to address it?
By Bill Harrod Federal CTO, Ivanti, 6/21/2021
Comment0 comments  |  Read  |  Post a Comment
Attackers Find New Way to Exploit Google Docs for Phishing
Jai Vijayan, Contributing WriterNews
Tactic continues recent trend by attackers to use trusted cloud services to send and host malicious content.
By Jai Vijayan Contributing Writer, 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
This Week in Database Leaks: Cognyte, CVS, Wegmans
Kelly Sheridan, Staff Editor, Dark ReadingNews
Billions of records were found exposed this week due to unprotected databases owned by major corporations and third-party providers.
By Kelly Sheridan Staff Editor, Dark Reading, 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
Accidental Insider Leaks Prove Major Source of Risk
Dark Reading Staff, Quick Hits
Research reports highlight growing concerns around insider negligence that leads to data breaches.
By Dark Reading Staff , 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
11 Security Certifications to Seek Out This Summer
Steve Zurier, Contributing Writer
The more you know, the more you grow. The Edge takes a fresh look at leading security certifications that can help advance your career.
By Steve Zurier Contributing Writer, 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
4 Habits of Highly Effective Security Operators
Ricardo Villadiego, Founder and CEO of LumuCommentary
These good habits can make all the difference in advancing careers for cybersecurity operators who spend their days putting out fires large and small.
By Ricardo Villadiego Founder and CEO of Lumu, 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
Data Breaches Surge in Food & Beverage, Other Industries
Jai Vijayan, Contributing WriterNews
Six previously "under-attacked" vertical industries saw a surge in data breaches last year due to COVID-19 related disruptions and other factors, new data shows.
By Jai Vijayan Contributing Writer, 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
One in Five Manufacturing Firms Targeted by Cyberattacks
Robert Lemos, Contributing WriterNews
Information-stealing malware makes up about a third of attacks, a study finds, but companies worry most about ransomware shutting down production.
By Robert Lemos Contributing Writer, 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Carnival Cruise Line Reports Security Breach
Dark Reading Staff, Quick Hits
The cruise ship operator says the incident affected employee and guest data.
By Dark Reading Staff , 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Google Launches SLSA, a New Framework for Supply Chain Integrity
Dark Reading Staff, Quick Hits
The "Supply chain Levels for Software Artifacts" aims to ensure the integrity of components throughout the software supply chain.
By Dark Reading Staff , 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of TessianCommentary
Consider four factors and behaviors that impact a particular employee's risk, and how security training should take them into account.
By Tim Sadler CEO and co-founder of Tessian, 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Mission Critical: What Really Matters in a Cybersecurity Incident
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLCCommentary
The things you do before and during a cybersecurity incident can make or break the success of your response.
By Beth Burgin Waller Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC, 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Ukraine Police Disrupt Cl0p Ransomware Operation
Jai Vijayan, Contributing WriterNews
Growing list of similar actions in recent months may finally be scaring some operators into quitting, but threat is far from over, security experts say.
By Jai Vijayan Contributing Writer, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Ransomware Operators' Strategies Evolve as Attacks Rise
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security researchers find ransomware operators rely less on email and more on criminal groups for initial access into target networks.
By Kelly Sheridan Staff Editor, Dark Reading, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Biden Tells Putin Critical Infrastructure Sectors 'Off Limits' to Russian Hacking
Dark Reading Staff, Quick Hits
President Joe Biden said he and Russian President Vladimir Putin agreed to discuss boundaries in cyber activity.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Security Flaw Discovered In Peloton Equipment
Dark Reading Staff, Quick Hits
The vulnerability could give attackers remote root access to the bike's tablet, researchers report.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Cars, Medicine, Electric Grids: Future Hackers Will Hit Much More Than Networks in an IT/OT Integrated World
Greg Valentine, Senior Cybersecurity Director, Capgemini North AmericaCommentary
Intelligent systems must include the right cybersecurity protections to prevent physical threats to operational technology.
By Greg Valentine Senior Cybersecurity Director, Capgemini North America, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Russian National Convicted on Charges Related to Kelihos Botnet
Dark Reading Staff, Quick Hits
Oleg Koshkin was arrested in 2019 and faces a maximum penalty of 15 years in prison, the DoJ reports.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Is an Attacker Living Off Your Land?
Samuel Greengard, Freelance Writer
Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.
By Samuel Greengard Freelance Writer, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Keeping Your Organization Secure When Dealing With the Unexpected
Zane Lackey, Co-Founder and CSO of Signal SciencesCommentary
There's no way to anticipate every possible scenario, but the right approach to business continuity can help you respond effectively in any situation.
By Zane Lackey Co-Founder and CSO of Signal Sciences, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

The more you know, the more you grow. The Edge takes a fresh look at leading security certifications that can help advance your career.
Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.
Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.
Register for Dark Reading Newsletters
Cartoon Contest
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7031
PUBLISHED: 2021-06-21
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2021-28684
PUBLISHED: 2021-06-21
The XML parser used in ConeXware PowerArchiver before 20.10.02 allows processing of external entities, which might lead to exfiltration of local files over the network (via an XXE attack).
CVE-2021-28833
PUBLISHED: 2021-06-21
Increments Qiita::Markdown before 0.34.0 allows XSS via a crafted gist link, a different vulnerability than CVE-2021-28796.
CVE-2019-7002
PUBLISHED: 2021-06-21
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
CVE-2021-29337
PUBLISHED: 2021-06-21
MODAPI.sys in MSI Dragon Center 2.0.104.0 allows low-privileged users to access kernel memory and potentially escalate privileges via a crafted IOCTL 0x9c406104 call. This IOCTL provides the MmMapIoSpace feature for mapping physical memory.
Flash Poll
Video
Slideshows
Twitter Feed