Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

7 Unconventional Pieces of Password Wisdom
New CPU Baseline for Windows 11 Will Ensure Better Security, Microsoft Says
Data Privacy Is in 23andMe CSO's DNA
When Will Cybersecurity Operations Adopt the Peter Parker Principle?
News & Commentary
Barracuda Agrees to Acquire Skout Cybersecurity
Dark Reading Staff, Quick Hits
The acquisition will bring Barracuda into the extended detection and response (XDR) market with a tool for managed service providers.
By Dark Reading Staff , 7/2/2021
Comment0 comments  |  Read  |  Post a Comment
Secured-Core PCs May Mitigate Firmware Attacks, but Adoption Lags
Robert Lemos, Contributing WriterNews
Microsoft maintains that exploitation of recent Dell vulnerabilities would be blocked on ultra-secure PCs - but most systems do not have the technology yet.
By Robert Lemos Contributing Writer, 7/2/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Issues New CVE for 'PrintNightmare' Flaw
Jai Vijayan, Contributing WriterNews
Company says remote code execution issue in all Windows versions is different from one in Windows Print Spooler that it had patched last month, though both affect same function.
By Jai Vijayan Contributing Writer, 7/2/2021
Comment0 comments  |  Read  |  Post a Comment
SOC Investment Improves Detection and Response Times, Data Shows
Dark Reading Staff, Quick Hits
A survey of IT and security pros finds many are confident in their ability to detect security incidents in near-real time or within minutes.
By Dark Reading Staff , 7/2/2021
Comment0 comments  |  Read  |  Post a Comment
5 Mistakes That Impact a Security Team's Success
Joshua Goldfarb, Director of Product Management at F5
The way we work and treat each other go a long way in improving our organizations' security posture.
By Joshua Goldfarb Director of Product Management at F5, 7/2/2021
Comment0 comments  |  Read  |  Post a Comment
WFH: A Smart Time to Revisit Employee Use of Social Media
Jennifer DeTrani & Landon Winkelvoss, General Counsel/EVP, Nisos / VP of Content and Co-Founder, NisosCommentary
Employers have their hands full when it comes to monitoring online activities that could hurt the brand or violate the organization's core values.
By Jennifer DeTrani & Landon Winkelvoss General Counsel/EVP, Nisos / VP of Content and Co-Founder, Nisos, 7/2/2021
Comment0 comments  |  Read  |  Post a Comment
GitHub Unveils AI Tool to Speed Development, but Beware Insecure Code
Robert Lemos, Contributing WriterNews
The company has created an AI system, dubbed Copilot, to offer code suggestions to developers, but warns that any code produced should be tested for defects and vulnerabilities.
By Robert Lemos Contributing Writer, 7/1/2021
Comment0 comments  |  Read  |  Post a Comment
CISA Urges Orgs to Disable Windows Print Spooler on Critical Systems
Jai Vijayan, Contributing WriterNews
Patches Microsoft issued last month not effective against exploits targeting "PrintNightmare" flaw, agency and others say.
By Jai Vijayan Contributing Writer, 7/1/2021
Comment0 comments  |  Read  |  Post a Comment
WhiteHat Security Rebrands as NTT Application Security
Dark Reading Staff, Quick Hits
The name change follows NTT Security Corporation's acquisition of WhiteHat in 2019.
By Dark Reading Staff , 7/1/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Edge Toon: Security Grill
John Klossner, Cartoonist
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 7/1/2021
Comment0 comments  |  Read  |  Post a Comment
CISA Updates CSET Tool for Ransomware Defense
Dark Reading Staff, Quick Hits
A new module provides a set of practices to help organizations assess how well-equipped they are to defend and recover from ransomware.
By Dark Reading Staff , 7/1/2021
Comment0 comments  |  Read  |  Post a Comment
NSA & CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Fancy Bear nation-state hacking team add a modern twist on old-school hacking method by using a cluster of Kubernetes software containers to expedite credential theft.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/1/2021
Comment0 comments  |  Read  |  Post a Comment
Why Are There Never Enough Logs During an Incident Response?
Robert Meyers, Compliance and Privacy Professional and Channel Program Solutions Architect, One IdentityCommentary
Most security pros believe their responses could be dramatically quicker were the right logs available, and usually they're not.
By Robert Meyers Compliance and Privacy Professional and Channel Program Solutions Architect, One Identity, 7/1/2021
Comment0 comments  |  Read  |  Post a Comment
Stop Playing Catchup: Move From Reactive to Proactive to Defeat Cyber Threats
Rick van Galen, Security Engineer, 1PasswordCommentary
One-time reactive measures can't keep up. It's time to be proactive and pick our swords and not just our shields.
By Rick van Galen Security Engineer, 1Password, 7/1/2021
Comment0 comments  |  Read  |  Post a Comment
SentinelOne Starts Trading on NYSE, Raises $1.2B in IPO
Kelly Sheridan, Staff Editor, Dark ReadingNews
IPO is the highest valued in cybersecurity history, according to reports.
By Kelly Sheridan Staff Editor, Dark Reading, 6/30/2021
Comment0 comments  |  Read  |  Post a Comment
SMB Worm Targeting EternalBlue Vuln Spreads to US
Jai Vijayan, Contributing WriterNews
"Indexsinas" is the latest threat designed to exploit Windows servers that remain vulnerable to an NSA-developed exploit Microsoft patched more than four years ago.
By Jai Vijayan Contributing Writer, 6/30/2021
Comment1 Comment  |  Read  |  Post a Comment
Impersonation Becomes Top Phishing Technique
Dark Reading Staff, Quick Hits
A new report finds IT, healthcare, and manufacturing are the industries most targeted by phishing emails.
By Dark Reading Staff , 6/30/2021
Comment0 comments  |  Read  |  Post a Comment
MyBook Investigation Reveals Attackers Exploited Legacy, Zero-Day Vulnerabilities
Robert Lemos, Contributing WriterNews
A previously unknown flaw in Western Digital's older network-attached storage systems allowed unauthenticated commands to trigger a factory reset, formatting the hard drives, says the company after its preliminary investigation.
By Robert Lemos Contributing Writer, 6/30/2021
Comment0 comments  |  Read  |  Post a Comment
Attackers Already Unleashing Malware for Apple macOS M1 Chip
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Apple security expert Patrick Wardle found that some macOS malware written for the new M1 processor can bypass anti-malware tools.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/30/2021
Comment0 comments  |  Read  |  Post a Comment
Intl. Law Enforcement Operation Takes Down DoubleVPN
Dark Reading Staff, Quick Hits
The VPN service allegedly provided a means for cybercriminals to target their victims, Europol officials report.
By Dark Reading Staff , 6/30/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

The way we work and treat each other go a long way in improving our organizations' security posture.
Without a top-notch team to stop attackers, our favorite modes of transportation could come to a screeching halt.
What if insurers were to offer companies an incentive -- say, a discount -- for better protecting themselves? You know, the way car insurance companies offer lower premiums to customers who take a driver's ed course.
Register for Dark Reading Newsletters
Cartoon
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30557
PUBLISHED: 2021-07-02
Use after free in TabGroups in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-32738
PUBLISHED: 2021-07-02
js-stellar-sdk is a Javascript library for communicating with a Stellar Horizon server. The `Utils.readChallengeTx` function used in SEP-10 Stellar Web Authentication states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccoun...
CVE-2021-33889
PUBLISHED: 2021-07-02
OpenThread wpantund through 2021-07-02 has a stack-based Buffer Overflow because of an inconsistency in the integer data type for metric_len.
CVE-2021-34807
PUBLISHED: 2021-07-02
An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL ...
CVE-2021-35207
PUBLISHED: 2021-07-02
An issue was discovered in Zimbra Collaboration Suite 8.8 before 8.8.15 Patch 23 and 9.0 before 9.0.0 Patch 16. An XSS vulnerability exists in the login component of Zimbra Web Client, in which an attacker can execute arbitrary JavaScript by adding executable JavaScript to the loginErrorCode paramet...
Flash Poll
Video
Slideshows
Twitter Feed