Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The True Cost of a Ransomware Attack
Microsoft 365: Most Common Threat Vectors & Defensive Tips
Proposed Sale Casts Cloud Over Future of FireEye's Products
Cyber Athletes Compete to Form US Cyber Team
News & Commentary
How Does the Government Buy Its Cybersecurity?
Josh Ladick, President of GSA Focus, Inc.Commentary
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.
By Josh Ladick President of GSA Focus, Inc., 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
VPN Attacks Surged in First Quarter
Jai Vijayan, Contributing WriterNews
But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.
By Jai Vijayan Contributing Writer, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Cyber Analytics Database Exposed 5 Billion Records Online
Dark Reading Staff, Quick Hits
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Google Workspace Adds Client-Side Encryption
Dark Reading Staff, Quick Hits
Users given control over encryption keys, Google says.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work
Michael Daniel, President & CEO, Cyber Threat AllianceCommentary
We lack reliable, representative, actionable data about ransomware's actual scope, scale, and impact. The Ransom Incident Response Network could change that.
By Michael Daniel President & CEO, Cyber Threat Alliance, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Sight Unseen
John Klossner, CartoonistCommentary
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 6/14/2021
Comment6 comments  |  Read  |  Post a Comment
Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough
Hollie Hennessy, Senior Analyst, IoT Cybersecurity, Omdia Commentary
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.
By Hollie Hennessy Senior Analyst, IoT Cybersecurity, Omdia , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Trickbot Investigation Shows Details of Massive Cybercrime Effort
Robert Lemos, Contributing WriterNews
Nearly a score of cybercriminals allegedly worked together to create the Trickbot malware and deploy it against more than a million users, an unsealed indictment claims.
By Robert Lemos Contributing Writer, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
McDonald's Data Breach Exposed Business & Customer Data
Dark Reading Staff, Quick Hits
An investigation has revealed company data has been breached in the United States, South Korea, and Taiwan.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Details Emerge on How Gaming Giant EA Was Hacked
Dark Reading Staff, Quick Hits
Hacking group stole source code to FIFA 21 and the company's Frostbite engine.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Many Mobile Apps Intentionally Using Insecure Connections for Sending Data
Jai Vijayan, Contributing WriterNews
A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections.
By Jai Vijayan Contributing Writer, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Secure Access Trade-offs for DevSecOps Teams
Ev Kontsevoy, CEO of TeleportCommentary
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization and zero-trust principles for their computing resources.
By Ev Kontsevoy CEO of Teleport, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing WriterNews
"Prometheus" is the latest example of how the ransomware-as-a-service model is letting new gangs scale up operations quickly.
By Jai Vijayan Contributing Writer, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
'Fancy Lazarus' Criminal Group Launches DDoS Extortion Campaign
Kelly Sheridan, Staff Editor, Dark ReadingNews
The group has re-emerged after a brief hiatus with a new email campaign threatening a DDoS attack against businesses that don't pay ransom.
By Kelly Sheridan Staff Editor, Dark Reading, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Healthcare Device Security Firm COO Charged With Hacking Medical Center
Dark Reading Staff, Quick Hits
Vikas Singla, chief operating officer of security firm that provides products and services to the healthcare industry, faces charges surrounding a cyberattack he allegedly conducted against Duluth, Ga.-based Gwinnett Medical Center.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
JBS CEO Says Company Paid $11M in Ransom
Dark Reading Staff, Quick Hits
The decision to pay attackers was a difficult one, CEO Andre Nogueira said in a statement.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
'Beware the Lady Named Katie'
Edge Editors, Dark Reading
A semester-long course boiled down to two minutes and 45 seconds.
By Edge Editors Dark Reading, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
The Workforce Shortage in Cybersecurity Is a Myth
Michael Roytman, Chief Data Scientist, Kenna SecurityCommentary
What we really have is an automation-in-the-wrong-place problem.
By Michael Roytman Chief Data Scientist, Kenna Security, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Intl. Law Enforcement Operation Disrupts Slilpp Marketplace
Dark Reading Staff, Quick Hits
A seizure warrant affidavit unsealed today states Slilpp had sold allegedly stolen login credentials since 2012.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.
New requirements add 50 controls covering five control objectives. Here's a high-level look at each objective.
From the most accurate to the most practical, here are a few ways to ensure both employees and organizations are protected from risk.
Register for Dark Reading Newsletters
Cartoon Contest
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-15
Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why...
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...
Flash Poll
Twitter Feed