Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

11 Cybersecurity Vendors to Watch in 2021
Required MFA Is Not Sufficient for Strong Security: Report
Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work
New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'
News & Commentary
Security Experts Scrutinize Apple, Amazon IoT Networks
Robert Lemos, Contributing WriterNews
Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.
By Robert Lemos Contributing Writer, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Andariel Group Targets South Korean Entities in New Campaign
Dark Reading Staff, Quick Hits
Andariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.
By Dark Reading Staff , 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities
Dark Reading Staff, Quick Hits
Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.
By Dark Reading Staff , 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain
Chen Fradkin, Security Researcher at ClarotyCommentary
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.
By Chen Fradkin Security Researcher at Claroty, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
How President Biden Can Better Defend the US From Russian Hacks
Carlo Massimo, Freelance Writer,
Wilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.
By Carlo Massimo, Freelance Writer , 6/15/2021
Comment1 Comment  |  Read  |  Post a Comment
How Does the Government Buy Its Cybersecurity?
Josh Ladick, President of GSA Focus, Inc.Commentary
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.
By Josh Ladick President of GSA Focus, Inc., 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
VPN Attacks Surged in First Quarter
Jai Vijayan, Contributing WriterNews
But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.
By Jai Vijayan Contributing Writer, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Cyber Analytics Database Exposed 5 Billion Records Online
Dark Reading Staff, Quick Hits
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Google Workspace Adds Client-Side Encryption
Dark Reading Staff, Quick Hits
Users given control over encryption keys, Google says.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work
Michael Daniel, President & CEO, Cyber Threat AllianceCommentary
We lack reliable, representative, actionable data about ransomware's actual scope, scale, and impact. The Ransom Incident Response Network could change that.
By Michael Daniel President & CEO, Cyber Threat Alliance, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Sight Unseen
John Klossner, CartoonistCommentary
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 6/14/2021
Comment7 comments  |  Read  |  Post a Comment
Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough
Hollie Hennessy, Senior Analyst, IoT Cybersecurity, Omdia Commentary
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.
By Hollie Hennessy Senior Analyst, IoT Cybersecurity, Omdia , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Trickbot Investigation Shows Details of Massive Cybercrime Effort
Robert Lemos, Contributing WriterNews
Nearly a score of cybercriminals allegedly worked together to create the Trickbot malware and deploy it against more than a million users, an unsealed indictment claims.
By Robert Lemos Contributing Writer, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
McDonald's Data Breach Exposed Business & Customer Data
Dark Reading Staff, Quick Hits
An investigation has revealed company data has been breached in the United States, South Korea, and Taiwan.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Details Emerge on How Gaming Giant EA Was Hacked
Dark Reading Staff, Quick Hits
Hacking group stole source code to FIFA 21 and the company's Frostbite engine.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Many Mobile Apps Intentionally Using Insecure Connections for Sending Data
Jai Vijayan, Contributing WriterNews
A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections.
By Jai Vijayan Contributing Writer, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Secure Access Trade-offs for DevSecOps Teams
Ev Kontsevoy, CEO of TeleportCommentary
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization and zero-trust principles for their computing resources.
By Ev Kontsevoy CEO of Teleport, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing WriterNews
"Prometheus" is the latest example of how the ransomware-as-a-service model is letting new gangs scale up operations quickly.
By Jai Vijayan Contributing Writer, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
'Fancy Lazarus' Criminal Group Launches DDoS Extortion Campaign
Kelly Sheridan, Staff Editor, Dark ReadingNews
The group has re-emerged after a brief hiatus with a new email campaign threatening a DDoS attack against businesses that don't pay ransom.
By Kelly Sheridan Staff Editor, Dark Reading, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Dark Reading Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the Dark Reading site in the coming months.

The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.
New requirements add 50 controls covering five control objectives. Here's a high-level look at each objective.
From the most accurate to the most practical, here are a few ways to ensure both employees and organizations are protected from risk.
Register for Dark Reading Newsletters
Cartoon Contest
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31494
PUBLISHED: 2021-06-15
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within th...
CVE-2021-31495
PUBLISHED: 2021-06-15
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within th...
CVE-2021-31496
PUBLISHED: 2021-06-15
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within th...
CVE-2021-31497
PUBLISHED: 2021-06-15
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within th...
CVE-2021-31498
PUBLISHED: 2021-06-15
This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop 16.6.3.84. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists w...
Flash Poll
Video
Slideshows
Twitter Feed