Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

News & Commentary
Don't Get Stymied by Security Indecision
Alex Pezold, Founder & Chief Executive Officer, TokenExCommentary
You might be increasing cyber-risk by not actively working to reduce it.
By Alex Pezold Founder & Chief Executive Officer, TokenEx, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark ReadingNews
Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.
By Kelly Sheridan Staff Editor, Dark Reading, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain
Chen Fradkin, Security Researcher at ClarotyCommentary
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.
By Chen Fradkin Security Researcher at Claroty, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
How Does the Government Buy Its Cybersecurity?
Josh Ladick, President of GSA Focus, Inc.Commentary
The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.
By Josh Ladick President of GSA Focus, Inc., 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Sight Unseen
John Klossner, CartoonistCommentary
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 6/14/2021
Comment7 comments  |  Read  |  Post a Comment
Secure Access Trade-offs for DevSecOps Teams
Ev Kontsevoy, CEO of TeleportCommentary
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization and zero-trust principles for their computing resources.
By Ev Kontsevoy CEO of Teleport, 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
Healthcare Device Security Firm COO Charged With Hacking Medical Center
Dark Reading Staff, Quick Hits
Vikas Singla, chief operating officer of security firm that provides products and services to the healthcare industry, faces charges surrounding a cyberattack he allegedly conducted against Duluth, Ga.-based Gwinnett Medical Center.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Intl. Law Enforcement Operation Disrupts Slilpp Marketplace
Dark Reading Staff, Quick Hits
A seizure warrant affidavit unsealed today states Slilpp had sold allegedly stolen login credentials since 2012.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Deepfakes Are on the Rise, but Don't Panic Just Yet
John Donegan, Enterprise analyst at ManageEngineCommentary
Deepfakes will likely give way to deep suspicion, as users try to sort legitimate media from malicious.
By John Donegan Enterprise analyst at ManageEngine, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Cyber Is the New Cold War & AI Is the Arms Race
Nancy Grady, Chief Data Scientist & Solutions ArchitectCommentary
Continual cyberattacks have pushed us into a new kind of Cold War, with artificial intelligence the basis of this new arms race.
By Nancy Grady Chief Data Scientist & Solutions Architect, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Required MFA Is Not Sufficient for Strong Security: Report
Robert Lemos, Contributing WriterNews
Attackers and red teams find multiple ways to bypass poorly deployed MFA in enterprise environments, underscoring how redundancy and good design are still required.
By Robert Lemos Contributing Writer, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
RSA Spins Off Fraud & Risk Intelligence Unit
Kelly Sheridan, Staff Editor, Dark ReadingNews
The new company, called Outseer, will continue to focus on payment authentication and fraud detection and analysis.
By Kelly Sheridan Staff Editor, Dark Reading, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
CISA Addresses Rise in Ransomware Threatening OT Assets
Dark Reading Staff, Quick Hits
The agency has released guidance in response to a rise of ransomware attacks affecting OT assets and control systems.
By Dark Reading Staff , 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
With Cloud, CDO and CISO Concerns Are Equally Important
Ameesh Divatia, Co-Founder & CEO of BaffleCommentary
Navigated properly, a melding of these complementary perspectives can help keep an organization more secure.
By Ameesh Divatia Co-Founder & CEO of Baffle, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
Phished Account Credentials Mostly Verified in Hours
Robert Lemos, Contributing WriterNews
Almost two-thirds of all phished credentials are verified by attackers within a day and then used in a variety of schemes, including business email compromise and targeting other users with malicious code.
By Robert Lemos Contributing Writer, 6/8/2021
Comment0 comments  |  Read  |  Post a Comment
Colonial Pipeline CEO: Ransomware Attack Started via Pilfered 'Legacy' VPN Account
Dark Reading Staff, Quick Hits
No multifactor authentication was attached to the stolen VPN password used by the attackers, Colonial Pipeline president & CEO Joseph Blount told a Senate committee today.
By Dark Reading Staff , 6/8/2021
Comment0 comments  |  Read  |  Post a Comment
Microsoft CISO Shares Remote Work Obstacles & Lessons Learned
Kelly Sheridan, Staff Editor, Dark ReadingNews
Bret Arsenault explains changes he implemented along the way as Microsoft's workforce went from 20% to 97% remote.
By Kelly Sheridan Staff Editor, Dark Reading, 6/8/2021
Comment0 comments  |  Read  |  Post a Comment
How Employees Can Keep Their 401(k)s Safe From Cybercriminals
Matt Lindley, COO and CISO at NINJIOCommentary
As retirement fund balances grow, cybercriminals are becoming more brazen in their efforts to deplete people's savings.
By Matt Lindley COO and CISO at NINJIO, 6/8/2021
Comment0 comments  |  Read  |  Post a Comment
Cyber Resilience: The Emerald City of the Security World
Ryan Weeks, Chief Information Security Officer at DattoCommentary
Small and midsize businesses and managed service providers must use their heart, brain, and courage as they follow the Yellow Brick Road to cyber resilience.
By Ryan Weeks Chief Information Security Officer at Datto, 6/8/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27479
PUBLISHED: 2021-06-16
ZOLL Defibrillator Dashboard, v prior to 2.2,The affected product’s web application could allow a low privilege user to inject parameters to contain malicious scripts to be executed by higher privilege users.
CVE-2021-27483
PUBLISHED: 2021-06-16
ZOLL Defibrillator Dashboard, v prior to 2.2,The affected products contain insecure filesystem permissions that could allow a lower privilege user to escalate privileges to an administrative level user.
CVE-2021-27485
PUBLISHED: 2021-06-16
ZOLL Defibrillator Dashboard, v prior to 2.2,The application allows users to store their passwords in a recoverable format, which could allow an attacker to retrieve the credentials from the web browser.
CVE-2021-31159
PUBLISHED: 2021-06-16
Zoho ManageEngine ServiceDesk Plus MSP before 10519 is vulnerable to a User Enumeration bug due to improper error-message generation in the Forgot Password functionality, aka SDPMSP-15732.
CVE-2021-31857
PUBLISHED: 2021-06-16
In Zoho ManageEngine Password Manager Pro before 11.1 build 11104, attackers are able to retrieve credentials via a browser extension for non-website resource types.