Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

News & Commentary
Microsoft Security Business Exceeds $10B in Revenue
Dark Reading Staff, Quick Hits
Microsoft's security division has grown more than 40% year-over-year, the company reports alongside security product updates.
By Dark Reading Staff , 1/27/2021
Comment0 comments  |  Read  |  Post a Comment
Many Cybersecurity Job Candidates Are Subpar, While On-the-Job Training Falls Short
Robert Lemos, Contributing WriterNews
With demand for skilled cybersecurity workers so high, is it really surprising that most companies are seeing fewer qualified applicants?
By Robert Lemos Contributing Writer, 1/27/2021
Comment1 Comment  |  Read  |  Post a Comment
Security's Inevitable Shift to the Edge
Patrick Sullivan, Akamai CTO, Security StrategyCommentary
As the edge becomes the place for DDoS mitigation, Web app security, and other controls, SASE is the management platform to handle them all.
By Patrick Sullivan Akamai CTO, Security Strategy, 1/27/2021
Comment0 comments  |  Read  |  Post a Comment
Fighting the Rapid Rise of Cyber Warfare in a Changing World
Patrick Walsh, Senior Vice President, Training & Technology, SkillstormCommentary
Global cyber warfare is a grim reality, but strong public-private relationships and security frameworks can safeguard people, institutions, and businesses.
By Patrick Walsh Senior Vice President, Training & Technology, Skillstorm, 1/26/2021
Comment0 comments  |  Read  |  Post a Comment
Small Security Teams Have Big Security Fears, CISOs Report
Dark Reading Staff, Quick Hits
Researchers poll security leaders who are tasked with protecting large organizations but have a small presence and budget.
By Dark Reading Staff , 1/25/2021
Comment0 comments  |  Read  |  Post a Comment
SolarWinds Attack, Cyber Supply Chain Among Priorities for Biden Administration
Robert Lemos, Contributing WriterNews
During Senate confirmation hearings, the nominees for Secretary of Homeland Security and Director of National Intelligence pledged to focus on cybersecurity.
By Robert Lemos Contributing Writer, 1/20/2021
Comment0 comments  |  Read  |  Post a Comment
Tips for a Bulletproof War Room Strategy
Lee Chieffalo, Technical Director of Cybersecurity Operations at ViasatCommentary
The techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets.
By Lee Chieffalo Technical Director of Cybersecurity Operations at Viasat, 1/20/2021
Comment0 comments  |  Read  |  Post a Comment
The Most Pressing Concerns Facing CISOs Today
John Worrall, Chief Executive Officer at ZeroNorthCommentary
Building security into the software development life cycle creates more visibility, but CISOs still need stay on top of any serious threats on the horizon, even if they are largely unknown.
By John Worrall Chief Executive Officer at ZeroNorth, 1/19/2021
Comment0 comments  |  Read  |  Post a Comment
Businesses Struggle with Cloud Availability as Attackers Take Aim
Kelly Sheridan, Staff Editor, Dark ReadingNews
Researchers find organizations struggle with availability for cloud applications as government officials warn of cloud-focused cyberattacks.
By Kelly Sheridan Staff Editor, Dark Reading, 1/14/2021
Comment0 comments  |  Read  |  Post a Comment
SolarWinds Attackers May Have Hit Mimecast, Driving New Concerns
Dark Reading Staff, Quick Hits
Mimecast no longer uses the SolarWinds Orion network management software that served as an attack vector for thousands of organizations.
By Dark Reading Staff , 1/13/2021
Comment0 comments  |  Read  |  Post a Comment
Security Operations Struggle to Defend Value, Keep Workers
Robert Lemos, Contributing WriterNews
Companies continue to value security operations centers but the economics are increasingly challenging, with high analyst turnover and questions raised over return on investment.
By Robert Lemos Contributing Writer, 1/12/2021
Comment0 comments  |  Read  |  Post a Comment
Over-Sharer or Troublemaker? How to Identify Insider-Risk Personas
Mark Wojtasiak, VP, Portfolio Marketing, Code42Commentary
It's past time to begin charting insider risk indicators that identify risky behavior and stop it in its tracks.
By Mark Wojtasiak VP, Portfolio Marketing, Code42, 1/12/2021
Comment0 comments  |  Read  |  Post a Comment
SolarWinds Hires Chris Krebs and Alex Stamos for Breach Recovery
Dark Reading Staff, Quick Hits
The former US cybersecurity official and former Facebook security chief will help SolarWinds respond to its recent attack and improve security.
By Dark Reading Staff , 1/8/2021
Comment0 comments  |  Read  |  Post a Comment
Top 5 'Need to Know' Coding Defects for DevSecOps
Walter Capitani, Director, Technical Product Management, GrammaTechCommentary
Integrating static analysis into the development cycle can prevent coding defects and deliver secure software faster.
By Walter Capitani Director, Technical Product Management, GrammaTech, 1/8/2021
Comment0 comments  |  Read  |  Post a Comment
Cobalt Strike & Metasploit Tools Were Attacker Favorites in 2020
Kelly Sheridan, Staff Editor, Dark ReadingNews
Research reveals APT groups and cybercriminals employ these offensive security tools as often as red teams.
By Kelly Sheridan Staff Editor, Dark Reading, 1/7/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Source Code Exposed: What We Know & What It Means
Kelly Sheridan, Staff Editor, Dark ReadingNews
Microsoft says there is no increase in security risk; however, experts say access to source code could make some steps easier for attackers.
By Kelly Sheridan Staff Editor, Dark Reading, 1/4/2021
Comment0 comments  |  Read  |  Post a Comment
Netwrix and Stealthbits Merge to Tackle Data Security
Dark Reading Staff, Quick Hits
The combined entity will have a portfolio of security tools designed to identify security risk and recover from incidents.
By Dark Reading Staff , 1/4/2021
Comment0 comments  |  Read  |  Post a Comment
COVID-19's Acceleration of Cloud Migration & Identity-Centric Security
Dr. Jasson Casey, CTO of Beyond IdentityCommentary
Here are some tips for updating access control methods that accommodate new remote working norms without sacrificing security.
By Dr. Jasson Casey CTO of Beyond Identity, 1/4/2021
Comment0 comments  |  Read  |  Post a Comment
Defending the COVID-19 Vaccine Supply Chain
Nick Rossmann, Global Threat Intelligence Lead, IBM Security X-ForceCommentary
We must treat this supply chain like a piece of our nation's critical infrastructure, just like the electrical grid or air traffic control system.
By Nick Rossmann Global Threat Intelligence Lead, IBM Security X-Force, 12/28/2020
Comment0 comments  |  Read  |  Post a Comment
10 Benefits of Running Cybersecurity Exercises
Steve Durbin, CEO of the Information Security ForumCommentary
There may be no better way to ascertain your organization's strengths and weaknesses than by running regular security drills.
By Steve Durbin CEO of the Information Security Forum, 12/28/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-26276
PUBLISHED: 2021-01-27
** DISPUTED ** scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data.