Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The True Cost of a Ransomware Attack
Microsoft 365: Most Common Threat Vectors & Defensive Tips
Proposed Sale Casts Cloud Over Future of FireEye's Products
Cyber Athletes Compete to Form US Cyber Team
News & Commentary
Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work
Michael Daniel, President & CEO, Cyber Threat AllianceCommentary
We lack reliable, representative, actionable data about ransomware's actual scope, scale, and impact. The Ransom Incident Response Network could change that.
By Michael Daniel President & CEO, Cyber Threat Alliance, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Sight Unseen
John Klossner, CartoonistCommentary
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 6/14/2021
Comment1 Comment  |  Read  |  Post a Comment
Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough
Hollie Hennessy, Senior Analyst, IoT Cybersecurity, Omdia Commentary
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.
By Hollie Hennessy Senior Analyst, IoT Cybersecurity, Omdia , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Trickbot Investigation Shows Details of Massive Cybercrime Effort
Robert Lemos, Contributing WriterNews
Nearly a score of cybercriminals allegedly worked together to create the Trickbot malware and deploy it against more than a million users, an unsealed indictment claims.
By Robert Lemos Contributing Writer, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
McDonald's Data Breach Exposed Business & Customer Data
Dark Reading Staff, Quick Hits
An investigation has revealed company data has been breached in the United States, South Korea, and Taiwan.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Details Emerge on How Gaming Giant EA Was Hacked
Dark Reading Staff, Quick Hits
Hacking group stole source code to FIFA 21 and the company's Frostbite engine.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Many Mobile Apps Intentionally Using Insecure Connections for Sending Data
Jai Vijayan, Contributing WriterNews
A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections.
By Jai Vijayan Contributing Writer, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Secure Access Trade-offs for DevSecOps Teams
Ev Kontsevoy, CEO of TeleportCommentary
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization and zero-trust principles for their computing resources.
By Ev Kontsevoy CEO of Teleport, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing WriterNews
"Prometheus" is the latest example of how the ransomware-as-a-service model is letting new gangs scale up operations quickly.
By Jai Vijayan Contributing Writer, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
'Fancy Lazarus' Criminal Group Launches DDoS Extortion Campaign
Kelly Sheridan, Staff Editor, Dark ReadingNews
The group has re-emerged after a brief hiatus with a new email campaign threatening a DDoS attack against businesses that don't pay ransom.
By Kelly Sheridan Staff Editor, Dark Reading, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Healthcare Device Security Firm COO Charged With Hacking Medical Center
Dark Reading Staff, Quick Hits
Vikas Singla, chief operating officer of security firm that provides products and services to the healthcare industry, faces charges surrounding a cyberattack he allegedly conducted against Duluth, Ga.-based Gwinnett Medical Center.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
JBS CEO Says Company Paid $11M in Ransom
Dark Reading Staff, Quick Hits
The decision to pay attackers was a difficult one, CEO Andre Nogueira said in a statement.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
'Beware the Lady Named Katie'
Edge Editors, Dark Reading
A semester-long course boiled down to two minutes and 45 seconds.
By Edge Editors Dark Reading, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
The Workforce Shortage in Cybersecurity Is a Myth
Michael Roytman, Chief Data Scientist, Kenna SecurityCommentary
What we really have is an automation-in-the-wrong-place problem.
By Michael Roytman Chief Data Scientist, Kenna Security, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Intl. Law Enforcement Operation Disrupts Slilpp Marketplace
Dark Reading Staff, Quick Hits
A seizure warrant affidavit unsealed today states Slilpp had sold allegedly stolen login credentials since 2012.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Deepfakes Are on the Rise, but Don't Panic Just Yet
John Donegan, Enterprise analyst at ManageEngineCommentary
Deepfakes will likely give way to deep suspicion, as users try to sort legitimate media from malicious.
By John Donegan Enterprise analyst at ManageEngine, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
11 Cybersecurity Vendors to Watch in 2021
Jai Vijayan, Contributing Writer
The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.
By Jai Vijayan Contributing Writer, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Cyber Is the New Cold War & AI Is the Arms Race
Nancy Grady, Chief Data Scientist & Solutions ArchitectCommentary
Continual cyberattacks have pushed us into a new kind of Cold War, with artificial intelligence the basis of this new arms race.
By Nancy Grady Chief Data Scientist & Solutions Architect, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Required MFA Is Not Sufficient for Strong Security: Report
Robert Lemos, Contributing WriterNews
Attackers and red teams find multiple ways to bypass poorly deployed MFA in enterprise environments, underscoring how redundancy and good design are still required.
By Robert Lemos Contributing Writer, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
What to Know About Updates to the PCI Secure Software Standard
Sean Smith, Manager II, PCI Compliance Services, Optiv
New requirements add 50 controls covering five control objectives. Here's a high-level look at each objective.
By Sean Smith Manager II, PCI Compliance Services, Optiv, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by vderrill
Current Conversations Zoom Zoom!
In reply to: sorry about this
Post Your Own Reply
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.
New requirements add 50 controls covering five control objectives. Here's a high-level look at each objective.
From the most accurate to the most practical, here are a few ways to ensure both employees and organizations are protected from risk.
Register for Dark Reading Newsletters
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Post a Comment
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24360
PUBLISHED: 2021-06-14
The Yes/No Chart WordPress plugin before 1.0.12 did not sanitise its sid shortcode parameter before using it in a SQL statement, allowing medium privilege users (contributor+) to perform Blind SQL Injection attacks
CVE-2021-24382
PUBLISHED: 2021-06-14
The Smart Slider 3 Free and pro WordPress plugins before 3.5.0.9 did not sanitise the Project Name before outputting it back in the page, leading to a Stored Cross-Site Scripting issue. By default, only administrator users could access the affected functionality, limiting the exploitability of the v...
CVE-2021-24341
PUBLISHED: 2021-06-14
When deleting a date in the Xllentech English Islamic Calendar WordPress plugin before 2.6.8, the year_number and month_number POST parameters are not sanitised, escaped or validated before being used in a SQL statement, leading to SQL injection.
CVE-2021-24345
PUBLISHED: 2021-06-14
The page lists-management feature of the Sendit WP Newsletter WordPress plugin through 2.5.1, available to Administrator users does not sanitise, validate or escape the id_lista POST parameter before using it in SQL statement, therefore leading to Blind SQL Injection.
CVE-2021-24346
PUBLISHED: 2021-06-14
The Stock in & out WordPress plugin through 1.0.4 has a search functionality, the lowest accessible level to it being contributor. The srch POST parameter is not validated, sanitised or escaped before using it in the echo statement, leading to a reflected XSS issue
Flash Poll
Video
Slideshows
Twitter Feed