Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

News & Commentary
Data Leaked in Fertility Clinic Ransomware Attack
Dark Reading Staff, Quick Hits
Reproductive Biology Associates says the data of 38,000 patients may have been compromised in the April cyberattack.
By Dark Reading Staff , 6/21/2021
Comment0 comments  |  Read  |  Post a Comment
Baltimore County Public Schools' Ransomware Recovery Tops $8M
Dark Reading Staff, Quick Hits
The school district has spent seven months and a reported $8.1 million recovering from the November attack.
By Dark Reading Staff , 6/21/2021
Comment0 comments  |  Read  |  Post a Comment
Are Ransomware Attacks the New Pandemic?
Bill Harrod, Federal CTO, IvantiCommentary
Ransomware has been a problem for decades, so why is government just now beginning to address it?
By Bill Harrod Federal CTO, Ivanti, 6/21/2021
Comment0 comments  |  Read  |  Post a Comment
This Week in Database Leaks: Cognyte, CVS, Wegmans
Kelly Sheridan, Staff Editor, Dark ReadingNews
Billions of records were found exposed this week due to unprotected databases owned by major corporations and third-party providers.
By Kelly Sheridan Staff Editor, Dark Reading, 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
Accidental Insider Leaks Prove Major Source of Risk
Dark Reading Staff, Quick Hits
Research reports highlight growing concerns around insider negligence that leads to data breaches.
By Dark Reading Staff , 6/18/2021
Comment0 comments  |  Read  |  Post a Comment
Carnival Cruise Line Reports Security Breach
Dark Reading Staff, Quick Hits
The cruise ship operator says the incident affected employee and guest data.
By Dark Reading Staff , 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Google Launches SLSA, a New Framework for Supply Chain Integrity
Dark Reading Staff, Quick Hits
The "Supply chain Levels for Software Artifacts" aims to ensure the integrity of components throughout the software supply chain.
By Dark Reading Staff , 6/17/2021
Comment0 comments  |  Read  |  Post a Comment
Biden Tells Putin Critical Infrastructure Sectors 'Off Limits' to Russian Hacking
Dark Reading Staff, Quick Hits
President Joe Biden said he and Russian President Vladimir Putin agreed to discuss boundaries in cyber activity.
By Dark Reading Staff , 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Keeping Your Organization Secure When Dealing With the Unexpected
Zane Lackey, Co-Founder and CSO of Signal SciencesCommentary
There's no way to anticipate every possible scenario, but the right approach to business continuity can help you respond effectively in any situation.
By Zane Lackey Co-Founder and CSO of Signal Sciences, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Don't Get Stymied by Security Indecision
Alex Pezold, Founder & Chief Executive Officer, TokenExCommentary
You might be increasing cyber-risk by not actively working to reduce it.
By Alex Pezold Founder & Chief Executive Officer, TokenEx, 6/16/2021
Comment0 comments  |  Read  |  Post a Comment
Deloitte Buys Terbium Labs to Expand Threat Intel Capabilities
Dark Reading Staff, Quick Hits
Terbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.
By Dark Reading Staff , 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain
Chen Fradkin, Security Researcher at ClarotyCommentary
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.
By Chen Fradkin Security Researcher at Claroty, 6/15/2021
Comment0 comments  |  Read  |  Post a Comment
Cyber Analytics Database Exposed 5 Billion Records Online
Dark Reading Staff, Quick Hits
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Google Workspace Adds Client-Side Encryption
Dark Reading Staff, Quick Hits
Users given control over encryption keys, Google says.
By Dark Reading Staff , 6/14/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Sight Unseen
John Klossner, CartoonistCommentary
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 6/14/2021
Comment9 comments  |  Read  |  Post a Comment
Details Emerge on How Gaming Giant EA Was Hacked
Dark Reading Staff, Quick Hits
Hacking group stole source code to FIFA 21 and the company's Frostbite engine.
By Dark Reading Staff , 6/11/2021
Comment0 comments  |  Read  |  Post a Comment
JBS CEO Says Company Paid $11M in Ransom
Dark Reading Staff, Quick Hits
The decision to pay attackers was a difficult one, CEO Andre Nogueira said in a statement.
By Dark Reading Staff , 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
The Workforce Shortage in Cybersecurity Is a Myth
Michael Roytman, Chief Data Scientist, Kenna SecurityCommentary
What we really have is an automation-in-the-wrong-place problem.
By Michael Roytman Chief Data Scientist, Kenna Security, 6/10/2021
Comment0 comments  |  Read  |  Post a Comment
Required MFA Is Not Sufficient for Strong Security: Report
Robert Lemos, Contributing WriterNews
Attackers and red teams find multiple ways to bypass poorly deployed MFA in enterprise environments, underscoring how redundancy and good design are still required.
By Robert Lemos Contributing Writer, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
RSA Spins Off Fraud & Risk Intelligence Unit
Kelly Sheridan, Staff Editor, Dark ReadingNews
The new company, called Outseer, will continue to focus on payment authentication and fraud detection and analysis.
By Kelly Sheridan Staff Editor, Dark Reading, 6/9/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35196
PUBLISHED: 2021-06-21
** DISPUTED ** Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended fo...
CVE-2010-1433
PUBLISHED: 2021-06-21
Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauth...
CVE-2010-1434
PUBLISHED: 2021-06-21
Joomla! Core is prone to a session fixation vulnerability. An attacker may leverage this issue to hijack an arbitrary session and gain access to sensitive information, which may help in launching further attacks. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulne...
CVE-2010-1435
PUBLISHED: 2021-06-21
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the database through an already existing SQL injection vector. Joomla! Core versions 1.5.x ranging from 1.5...
CVE-2010-0413
PUBLISHED: 2021-06-21
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.