Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The True Cost of a Ransomware Attack
Microsoft 365: Most Common Threat Vectors & Defensive Tips
Proposed Sale Casts Cloud Over Future of FireEye's Products
Cyber Athletes Compete to Form US Cyber Team
News & Commentary
Google Workspace Adds Client-Side Encryption
Dark Reading Staff, Quick Hits
Users given control over encryption keys, Google says.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work
Michael Daniel, President & CEO, Cyber Threat AllianceCommentary
We lack reliable, representative, actionable data about ransomware's actual scope, scale, and impact. The Ransom Incident Response Network could change that.
By Michael Daniel President & CEO, Cyber Threat Alliance, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Sight Unseen
John Klossner, CartoonistCommentary
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 6/14/2021
Comment2 comments  |  Read  |  Post a Comment
Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough
Hollie Hennessy, Senior Analyst, IoT Cybersecurity, Omdia Commentary
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.
By Hollie Hennessy Senior Analyst, IoT Cybersecurity, Omdia , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Trickbot Investigation Shows Details of Massive Cybercrime Effort
Robert Lemos, Contributing WriterNews
Nearly a score of cybercriminals allegedly worked together to create the Trickbot malware and deploy it against more than a million users, an unsealed indictment claims.
By Robert Lemos Contributing Writer, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
McDonald's Data Breach Exposed Business & Customer Data
Dark Reading Staff, Quick Hits
An investigation has revealed company data has been breached in the United States, South Korea, and Taiwan.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Details Emerge on How Gaming Giant EA Was Hacked
Dark Reading Staff, Quick Hits
Hacking group stole source code to FIFA 21 and the company's Frostbite engine.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Many Mobile Apps Intentionally Using Insecure Connections for Sending Data
Jai Vijayan, Contributing WriterNews
A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections.
By Jai Vijayan Contributing Writer, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Secure Access Trade-offs for DevSecOps Teams
Ev Kontsevoy, CEO of TeleportCommentary
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization and zero-trust principles for their computing resources.
By Ev Kontsevoy CEO of Teleport, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing WriterNews
"Prometheus" is the latest example of how the ransomware-as-a-service model is letting new gangs scale up operations quickly.
By Jai Vijayan Contributing Writer, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
'Fancy Lazarus' Criminal Group Launches DDoS Extortion Campaign
Kelly Sheridan, Staff Editor, Dark ReadingNews
The group has re-emerged after a brief hiatus with a new email campaign threatening a DDoS attack against businesses that don't pay ransom.
By Kelly Sheridan Staff Editor, Dark Reading, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Healthcare Device Security Firm COO Charged With Hacking Medical Center
Dark Reading Staff, Quick Hits
Vikas Singla, chief operating officer of security firm that provides products and services to the healthcare industry, faces charges surrounding a cyberattack he allegedly conducted against Duluth, Ga.-based Gwinnett Medical Center.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
JBS CEO Says Company Paid $11M in Ransom
Dark Reading Staff, Quick Hits
The decision to pay attackers was a difficult one, CEO Andre Nogueira said in a statement.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
'Beware the Lady Named Katie'
Edge Editors, Dark Reading
A semester-long course boiled down to two minutes and 45 seconds.
By Edge Editors Dark Reading, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
The Workforce Shortage in Cybersecurity Is a Myth
Michael Roytman, Chief Data Scientist, Kenna SecurityCommentary
What we really have is an automation-in-the-wrong-place problem.
By Michael Roytman Chief Data Scientist, Kenna Security, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Intl. Law Enforcement Operation Disrupts Slilpp Marketplace
Dark Reading Staff, Quick Hits
A seizure warrant affidavit unsealed today states Slilpp had sold allegedly stolen login credentials since 2012.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Deepfakes Are on the Rise, but Don't Panic Just Yet
John Donegan, Enterprise analyst at ManageEngineCommentary
Deepfakes will likely give way to deep suspicion, as users try to sort legitimate media from malicious.
By John Donegan Enterprise analyst at ManageEngine, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
11 Cybersecurity Vendors to Watch in 2021
Jai Vijayan, Contributing Writer
The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.
By Jai Vijayan Contributing Writer, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Cyber Is the New Cold War & AI Is the Arms Race
Nancy Grady, Chief Data Scientist & Solutions ArchitectCommentary
Continual cyberattacks have pushed us into a new kind of Cold War, with artificial intelligence the basis of this new arms race.
By Nancy Grady Chief Data Scientist & Solutions Architect, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by vderrill
Current Conversations Zoom Zoom!
In reply to: sorry about this
Post Your Own Reply
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.
New requirements add 50 controls covering five control objectives. Here's a high-level look at each objective.
From the most accurate to the most practical, here are a few ways to ensure both employees and organizations are protected from risk.
Register for Dark Reading Newsletters
Cartoon Contest
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21554
PUBLISHED: 2021-06-14
Dell PowerEdge R640, R740, R740XD, R840, R940, R940xa, MX740c, MX840c, and, Dell Precision 7920 Rack Workstation BIOS contain a stack-based buffer overflow vulnerability in systems with Intel Optane DC Persistent Memory installed. A local malicious user with high privileges may potentially exploit t...
CVE-2021-21555
PUBLISHED: 2021-06-14
Dell PowerEdge R640, R740, R740XD, R840, R940, R940xa, MX740c, MX840c, and T640 Server BIOS contain a heap-based buffer overflow vulnerability in systems with NVDIMM-N installed. A local malicious user with high privileges may potentially exploit this vulnerability, leading to a denial of Service, a...
CVE-2021-21556
PUBLISHED: 2021-06-14
Dell PowerEdge R640, R740, R740XD, R840, R940, R940xa, MX740c, MX840c, and T640 Server BIOS contain a stack-based buffer overflow vulnerability in systems with NVDIMM-N installed. A local malicious user with high privileges may potentially exploit this vulnerability, leading to a denial of Service, ...
CVE-2021-21557
PUBLISHED: 2021-06-14
Dell PowerEdge Server BIOS and select Dell Precision Rack BIOS contain an out-of-bounds array access vulnerability. A local malicious user with high privileges may potentially exploit this vulnerability, leading to a denial of service, arbitrary code execution, or information disclosure in System Ma...
CVE-2021-32682
PUBLISHED: 2021-06-14
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration...
Flash Poll
Video
Slideshows
Twitter Feed