Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective
Learn SAML: The Language You Don't Know You're Already Speaking
How to Better Secure Your Microsoft 365 Environment
COVID-19: Latest Security News & Commentary
Privacy Teams Helped Navigate the Pivot to Work-from-Home
News & Commentary
Data Privacy Day 2021: Pandemic Response Data Must Align with Data Privacy Rules
Maxine Holt, Research Director, OmdiaCommentary
Amid a pandemic, Data Privacy Day this year brings forth expanded responsibilities for organizations in the response to COVID-19.
By Maxine Holt Research Director, Omdia, 1/28/2021
Comment0 comments  |  Read  |  Post a Comment
Intl. Law Enforcement Operation Disrupts Emotet Botnet
Kelly Sheridan, Staff Editor, Dark ReadingNews
Global law enforcement agencies have seized control of Emotet infrastructure, disrupting one of the world's most pervasive and dangerous cyber threats.
By Kelly Sheridan Staff Editor, Dark Reading, 1/27/2021
Comment0 comments  |  Read  |  Post a Comment
Critical Vulnerability Patched in 'sudo' Utility for Unix-Like OSes
Jai Vijayan, Contributing WriterNews
Flaw exists in versions of sudo going back nearly 10 years; USCYBERCOM recommends organizations patch immediately.
By Jai Vijayan Contributing Writer, 1/27/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Security Business Exceeds $10B in Revenue
Dark Reading Staff, Quick Hits
Microsoft's security division has grown more than 40% year-over-year, the company reports alongside security product updates.
By Dark Reading Staff , 1/27/2021
Comment0 comments  |  Read  |  Post a Comment
4 Clues to Spot a Bot Network
Kevin Graham, VP Canada & CALA Operations and Business Development, Babel StreetCommentary
Protect against misinformation and disinformation campaigns by learning how to identify the bot networks spreading falsehoods.
By Kevin Graham VP Canada & CALA Operations and Business Development, Babel Street, 1/27/2021
Comment0 comments  |  Read  |  Post a Comment
Many Cybersecurity Job Candidates Are Subpar, While On-the-Job Training Falls Short
Robert Lemos, Contributing WriterNews
With demand for skilled cybersecurity workers so high, is it really surprising that most companies are seeing fewer qualified applicants?
By Robert Lemos Contributing Writer, 1/27/2021
Comment1 Comment  |  Read  |  Post a Comment
Apple Patches Three iOS Zero-Day Vulnerabilities
Dark Reading Staff, Quick Hits
New iOS 14.4 update available for iPhones and iPads.
By Dark Reading Staff , 1/27/2021
Comment0 comments  |  Read  |  Post a Comment
Security's Inevitable Shift to the Edge
Patrick Sullivan, Akamai CTO, Security StrategyCommentary
As the edge becomes the place for DDoS mitigation, Web app security, and other controls, SASE is the management platform to handle them all.
By Patrick Sullivan Akamai CTO, Security Strategy, 1/27/2021
Comment0 comments  |  Read  |  Post a Comment
LogoKit Group Aims for Simple Yet Effective Phishing
Robert Lemos, Contributing WriterNews
A phishing kit that uses embedded JavaScript targeted the users of more than 300 sites in the past week, aiming to grab credentials for SharePoint, Adobe Document Cloud, and OneDrive.
By Robert Lemos Contributing Writer, 1/27/2021
Comment0 comments  |  Read  |  Post a Comment
Ransomware Disrupts Operations at Packaging Giant WestRock
Jai Vijayan, Contributing WriterNews
Incident is another reminder of how vulnerable OT environments are to attack, security experts say.
By Jai Vijayan Contributing Writer, 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
Pay-or-Get-Breached Ransomware Schemes Take Off
Robert Lemos, Contributing WriterNews
In 2020, ransomware attackers moved quickly to adopt so-called "double extortion" schemes, with more than 550 incidents in the fourth quarter alone.
By Robert Lemos Contributing Writer, 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
North Korean Attackers Target Security Researchers via Social Media: Google
Kelly Sheridan, Staff Editor, Dark ReadingNews
Google TAG warns the infosec community of unsolicited requests from individuals seeking collaboration on vulnerability research.
By Kelly Sheridan Staff Editor, Dark Reading, 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
Privacy Teams Helped Navigate the Pivot to Work-from-Home
Steve Zurier, Contributing WriterNews
Annual Cisco privacy study also reports that 90% of organizations say their customers won't buy from them if they are not clear about data policy practices.
By Steve Zurier Contributing Writer, 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
Mimecast: Recent Certificate Compromise Tied to SolarWinds Attacks
Dark Reading Staff, Quick Hits
Yet another security firm hit in the sweeping attack campaign believed to be out of Russia.
By Dark Reading Staff , 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
BEC Scammers Find New Ways to Navigate Microsoft 365
Dark Reading Staff, Quick Hits
Their techniques made use of out-of-office replies and automatic responses during the 2020 holiday season, researchers report.
By Dark Reading Staff , 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
Cartoon Caption Winner: Before I Go ...
John Klossner, Cartoonist
And the winner of The Edge's January cartoon caption contest is ...
By John Klossner Cartoonist, 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
Fighting the Rapid Rise of Cyber Warfare in a Changing World
Patrick Walsh, Senior Vice President, Training & Technology, SkillstormCommentary
Global cyber warfare is a grim reality, but strong public-private relationships and security frameworks can safeguard people, institutions, and businesses.
By Patrick Walsh Senior Vice President, Training & Technology, Skillstorm, 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
Learn SAML: The Language You Don't Know You're Already Speaking
Kelly Sheridan, Staff Editor, Dark Reading
Security Assertion Markup Language, a protocol most people use daily to log into applications, makes authentication easier for both admins and users. Here's what you need to know about SAML (and what it has to do with "GoldenSAML").
By Kelly Sheridan Staff Editor, Dark Reading, 1/26/2021
Comment1 Comment  |  Read  |  Post a Comment
Mainframe Security Automation Is Not a Luxury
John McKenny, SVP/GM of ZSolutions, BMC SoftwareCommentary
As cyber threats grow, even the most securable platform is vulnerable and requires adaptive autonomous protection.
By John McKenny SVP/GM of ZSolutions, BMC Software, 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
Startup Offers Free Version of its 'Passwordless' Technology
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Beyond Identity co-founders hope to move the needle in eliminating the need for passwords, but experts say killing passwords altogether won't be easy.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Security Now Joins Dark Reading

Find out more about the combination of two of the industry's leading cybersecurity news sites.

Security Assertion Markup Language, a protocol most people use daily to log into applications, makes authentication easier for both admins and users. Here's what you need to know about SAML (and what it has to do with "GoldenSAML").
There's a big difference between those that study 'known bads' and those that self-learn what is 'normal' and what isn't.
Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.
Register for Dark Reading Newsletters
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
White Papers
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25782
PUBLISHED: 2021-01-28
An issue was discovered on Accfly Wireless Security IR Camera 720P System with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CNetClientManage::ServerIP_Proto_Set during incoming message handling.
CVE-2020-25783
PUBLISHED: 2021-01-28
An issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated heap-based buffer overflow in the function CNetClientTalk::OprMsg during incoming message handling.
CVE-2020-25784
PUBLISHED: 2021-01-28
An issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CNetClientGuard::SubOprMsg during incoming message handling.
CVE-2020-25785
PUBLISHED: 2021-01-28
An issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CFtpProtocol::FtpLogin during the update procedure.
CVE-2020-0237
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Flash Poll
Video
Slideshows
Twitter Feed