Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

11 Security Certifications to Seek Out This Summer
Ukraine Police Disrupt Cl0p Ransomware Operation
Attackers Find New Way to Exploit Google Docs for Phishing
4 Habits of Highly Effective Security Operators
News & Commentary
Boardroom Perspectives on Cybersecurity: What It Means for You
Brian Contos, VP & CISO, Mandiant AdvantageCommentary
Because board members are paying close attention to security, security leaders must be able to respond to and alleviate their concerns with data.
By Brian Contos VP & CISO, Mandiant Advantage, 6/24/2021
Comment0 comments  |  Read  |  Post a Comment
Storms & Silver Linings: Avoiding the Dangers of Cloud Migration
Matt Lock, Technical Director at VaronisCommentary
We hear a lot about the sunlit uplands of cloud-powered business, but what about the risks of making information available across the organization?
By Matt Lock Technical Director at Varonis, 6/24/2021
Comment0 comments  |  Read  |  Post a Comment
John McAfee, Creator of McAfee Antivirus Software, Dead at 75
Dark Reading Staff, Quick Hits
McAfee, who was being held in a Spanish jail on US tax-evasion charges, had learned on Monday he would be extradited to the US.
By Dark Reading Staff , 6/24/2021
Comment0 comments  |  Read  |  Post a Comment
rMTD: A Deception Method That Throws Attackers Off Their Game
Rui Maximo, Cybersec Entrepreneur
Through a variety of techniques, rotational Moving Target Defense makes existing OS and app vulnerabilities difficult to exploit. Here's how.
By Rui Maximo Cybersec Entrepreneur, 6/24/2021
Comment0 comments  |  Read  |  Post a Comment
79% of Third-Party Libraries in Apps Are Never Updated
Jai Vijayan, Contributing WriterNews
A lack of contextual information and concerns over application disruption among contributing factors.
By Jai Vijayan Contributing Writer, 6/23/2021
Comment0 comments  |  Read  |  Post a Comment
VMs Help Ransomware Attackers Evade Detection, but It's Uncommon
Kelly Sheridan, Staff Editor, Dark ReadingNews
Some ransomware attackers use virtual machines to bypass security detection, but adoption is slow for the complicated technique.
By Kelly Sheridan Staff Editor, Dark Reading, 6/23/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Tracks New BazaCall Malware Campaign
Dark Reading Staff, Quick Hits
Attackers use emails to prompt victims to call a fraudulent call center, where attackers instruct them to download a malicious file.
By Dark Reading Staff , 6/23/2021
Comment0 comments  |  Read  |  Post a Comment
New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers found a "novel" class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings that leak sensitive information on corporate and government customers, with one simple registration step.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/23/2021
Comment0 comments  |  Read  |  Post a Comment
Survey Seeks to Learn How 2020 Changed Security
Dark Reading Staff, Quick Hits
Respondents to a new Dark Reading/Omdia survey will be entered into a drawing for a Black Hat Black Card.
By Dark Reading Staff , 6/23/2021
Comment0 comments  |  Read  |  Post a Comment
When Will Cybersecurity Operations Adopt the Peter Parker Principle?
Robert Boudreaux, Field CTO, Deep InstinctCommentary
Having a prevention mindset means setting our prevention capabilities to "prevent" instead of relying on detection and response.
By Robert Boudreaux Field CTO, Deep Instinct, 6/23/2021
Comment0 comments  |  Read  |  Post a Comment
Expecting the Unexpected: Tips for Effectively Mitigating Ransomware Attacks in 2021
Luke Tenery & Ross Rustici, Partner, StoneTurn / Managing Director, StoneTurnCommentary
Cybercriminals continually innovate to thwart security protocols, but organizations can take steps to prevent and mitigate ransomware attacks.
By Luke Tenery & Ross Rustici Partner, StoneTurn / Managing Director, StoneTurn, 6/23/2021
Comment0 comments  |  Read  |  Post a Comment
Despite Heightened Cyber-Risks, Few Security Leaders Report to CEO
Jai Vijayan, Contributing WriterNews
A new report suggests that top management at most companies still don't get security.
By Jai Vijayan Contributing Writer, 6/22/2021
Comment0 comments  |  Read  |  Post a Comment
Transmit Security Announces $543M Series A Funding Round
Dark Reading Staff, Quick Hits
The passwordless technology provider says the funding will be used to increase its reach and expand primary business functions.
By Dark Reading Staff , 6/22/2021
Comment0 comments  |  Read  |  Post a Comment
NSA Funds Development & Release of D3FEND Framework
Dark Reading Staff, Quick Hits
The framework, now available through MITRE, provides countermeasures to attacks.
By Dark Reading Staff , 6/22/2021
Comment0 comments  |  Read  |  Post a Comment
Identity Eclipses Malware Detection at RSAC Startup Competition
Paul Shomo, Cybersecurity AnalystCommentary
All 10 finalists in the Innovation Sandbox were focused on identity, rather than security's mainstay for the last 20 years: Malware detection.
By Paul Shomo Cybersecurity Analyst, 6/22/2021
Comment0 comments  |  Read  |  Post a Comment
Majority of Web Apps in 11 Industries Are Vulnerable All the Time
Robert Lemos, Contributing WriterNews
Serious vulnerabilities exist every day in certain industries, including utilities, public administration, and professional services, according to testing data.
By Robert Lemos Contributing Writer, 6/22/2021
Comment0 comments  |  Read  |  Post a Comment
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer
Those looking to join the fight might want to polish up or acquire some (or all) of these hottest skills on the market.
By Pam Baker Contributing Writer, 6/22/2021
Comment0 comments  |  Read  |  Post a Comment
Does Your Cyberattack Plan Include a Crisis Communications Strategy? 5 Tips to Get Started
Ted Birkhahn, President, HPL CyberCommentary
Don't overlook crisis communications in your cybersecurity incident response planning.
By Ted Birkhahn President, HPL Cyber, 6/22/2021
Comment0 comments  |  Read  |  Post a Comment
Did Companies Fail to Disclose Being Affected by SolarWinds Breach?
Jai Vijayan, Contributing WriterNews
The SEC has sent out letters to some investment firms and publicly listed companies seeking information, Reuters says.
By Jai Vijayan Contributing Writer, 6/21/2021
Comment1 Comment  |  Read  |  Post a Comment
Software-Container Supply Chain Sees Spike in Attacks
Robert Lemos, Contributing WriterNews
Attackers target companies' container supply chain, driving a sixfold increase in a year, aiming to steal processing time for cryptomining and compromise cloud infrastructure.
By Robert Lemos Contributing Writer, 6/21/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

Through a variety of techniques, rotational Moving Target Defense makes existing OS and app vulnerabilities difficult to exploit. Here's how.
Those looking to join the fight might want to polish up or acquire some (or all) of these hottest skills on the market.
The more you know, the more you grow. The Edge takes a fresh look at leading security certifications that can help advance your career.
Register for Dark Reading Newsletters
Cartoon
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18661
PUBLISHED: 2021-06-24
Cross Site Scripting (XSS) vulnerability in gnuboard5 <=v5.3.2.8 via the url parameter to bbs/login.php.
CVE-2020-21787
PUBLISHED: 2021-06-24
CRMEB 3.1.0+ is vulnerable to File Upload Getshell via /crmeb/crmeb/services/UploadService.php.
CVE-2020-21788
PUBLISHED: 2021-06-24
In CRMEB 3.1.0+ strict domain name filtering leads to SSRF(Server-Side Request Forgery). The vulnerable code is in file /crmeb/app/admin/controller/store/CopyTaobao.php.
CVE-2021-23398
PUBLISHED: 2021-06-24
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
CVE-2021-33348
PUBLISHED: 2021-06-24
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
Flash Poll
Video
Slideshows
Twitter Feed