Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Latest Security News From RSAC 2021
10 Security Awareness Training Mistakes to Avoid
7 Modern-Day Cybersecurity Realities
Critical Infrastructure Under Attack
News & Commentary
Latest Security News From RSAC 2021
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2021.
By Dark Reading Staff , 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
How Attackers Weigh the Pros and Cons of BEC Techniques
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security researchers discuss attackers' evolving methodologies in business email compromise and phishing campaigns.
By Kelly Sheridan Staff Editor, Dark Reading, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
How to Get Employees to Care About Security
Joan Goodchild, Staff Editor
Want to a security awareness program that sticks? Make it fun and personal -- and offer free lunch.
By Joan Goodchild Staff Editor, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
Splunk to Acquire TruStar for Data Management
Dark Reading Staff, Quick Hits
Splunk said it will integrate TruStar's data-sharing capabilities into its Data-to-Everything platform following the acquisition.
By Dark Reading Staff , 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
FBI's IC3 Logs 1M Complaints in 14 Months
Dark Reading Staff, Quick Hits
The FBI's IC3 reports COVID-related scams and an increase in online retail may be behind the upswing in complaints.
By Dark Reading Staff , 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
Why Anti-Phishing Training Isn't Enough
Aviv Grafi, CEO & Founder, VotiroCommentary
Not only is relying on employees' awareness insufficient to prevent sophisticated social engineering attacks, some training methods can create other problems.
By Aviv Grafi CEO & Founder, Votiro, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
Best 11 Quotes From Cryptographers' Panel
Sara Peters, Senior Editor at Dark Reading
Cryptographers at an RSA Conference panel aren't worried about adversarial quantum cryptography. Machine learning, though, causes pressing practical issues.
By Sara Peters Senior Editor at Dark Reading, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
Researchers Create Covert Channel Over Apple AirTag Network
Robert Lemos, Contributing WriterNews
Small amounts of data could be sent from nearly anywhere using Apple's "Find My" network, hidden in the large volume of traffic as AirTags become widely used, two researchers say.
By Robert Lemos Contributing Writer, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
How to Mitigate Against Domain Credential Theft
Zur Ulianitzky & Yaron Shani, Head of Security Research , XM Cyber / Senior Cybersecurity Researcher, XM CyberCommentary
Attackers routinely reuse stolen domain credentials. Here are some ways to thwart their access.
By Zur Ulianitzky & Yaron Shani Head of Security Research , XM Cyber / Senior Cybersecurity Researcher, XM Cyber, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
Cisco Plans to Create 'Premium' SecureX Offering With Kenna Security Features
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Executives from Cisco share insights on the networking giant's ambitious security strategy.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/18/2021
Comment0 comments  |  Read  |  Post a Comment
DarkSide Ransomware Variant Targets Disk Partitions
Dark Reading Staff, Quick Hits
A newly discovered DarkSide ransomware variant can detect and compromise partitioned hard drives, researchers report.
By Dark Reading Staff , 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
47% of Criminals Buying Exploits Target Microsoft Products
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers examine English- and Russian-language underground exploits to track how exploits are advertised and sold.
By Kelly Sheridan Staff Editor, Dark Reading, 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
DDoS Attacks Up 31% in Q1 2021: Report
Dark Reading Staff, Quick Hits
If pace continues, DDoS attack activity could surpass last year's 10-million attack threshold.
By Dark Reading Staff , 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
Rapid7 Is the Latest Victim of a Software Supply Chain Breach
Jai Vijayan, Contributing WriterNews
Security vendor says attackers accessed some of its source code using a previously compromised Bash Uploader script from Codecov.
By Jai Vijayan Contributing Writer, 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
RSAC 2021: What Will SolarWinds' CEO Reveal?
Joan Goodchild, Staff Editor
In a keynote conversation with Forrester analyst Laura Koetzle, Sudhakar Ramakrishna will get candid about the historic breach.
By Joan Goodchild Staff Editor, 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
Agility Broke AppSec. Now It's Going to Fix It.
Chen Gour-Arie, Chief Architect, Enso SecurityCommentary
Outnumbered 100 to 1 by developers, AppSec needs a new model of agility to catch up and protect everything that needs to be secured.
By Chen Gour-Arie Chief Architect, Enso Security, 5/17/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Road Trip
John Klossner, CartoonistCommentary
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 5/17/2021
Comment2 comments  |  Read  |  Post a Comment
Rapid7 Source Code Accessed in Supply Chain Attack
Dark Reading Staff, Quick Hits
An investigation of the Codecov attack revealed intruders accessed Rapid7 source code repositories containing internal credentials and alert-related data.
By Dark Reading Staff , 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
How Faster COVID-19 Research Is Being Made Possible by Secure Silicon
Sara Peters, Senior Editor at Dark Reading
When Intel and Leidos set up a "trusted execution environment" to enable a widespread group of researchers to securely share and confidentially compute real-world data, it was no small achievement.
By Sara Peters Senior Editor at Dark Reading, 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
Cisco Confirms Plans to Acquire Kenna Security
Dark Reading Staff, Quick Hits
Cisco plans to integrate Kenna's vulnerability management technology into its SecureX platform.
By Dark Reading Staff , 5/14/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by raenye
Current Conversations "Network congestion ahead."
In reply to: entry
Post Your Own Reply
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

Want to a security awareness program that sticks? Make it fun and personal -- and offer free lunch.
Cryptographers at an RSA Conference panel aren't worried about adversarial quantum cryptography. Machine learning, though, causes pressing practical issues.
In a keynote conversation with Forrester analyst Laura Koetzle, Sudhakar Ramakrishna will get candid about the historic breach.
Register for Dark Reading Newsletters
Cartoon Contest
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-19924
PUBLISHED: 2021-05-18
In Boostnote 0.12.1, exporting to PDF contains opportunities for XSS attacks.
CVE-2020-20220
PUBLISHED: 2021-05-18
Mikrotik RouterOs prior to stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/bfd process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20227
PUBLISHED: 2021-05-18
Mikrotik RouterOs stable 6.47 suffers from a memory corruption vulnerability in the /nova/bin/diskd process. An authenticated remote attacker can cause a Denial of Service due to invalid memory access.
CVE-2020-20245
PUBLISHED: 2021-05-18
Mikrotik RouterOs stable 6.46.3 suffers from a memory corruption vulnerability in the log process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
CVE-2020-20246
PUBLISHED: 2021-05-18
Mikrotik RouterOs stable 6.46.3 suffers from a memory corruption vulnerability in the mactel process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
Flash Poll
Video
Slideshows
Twitter Feed